BIOS & FIRMWARE
- Driver & Tools
- BIOS & FIRMWARE
- Enhanced system stability.
- Enhanced input validation and refactored legacy string handling routines to ensure robust memory management.
- Mitigated security risks in AiCloud service by enforcing strict credential verification, implementing robust file path validation, and hardening command execution logic to prevent unauthorized access and manipulation of system resources.
- Implemented comprehensive validation and expanded command filtering in the web history API.
- Strengthened input validation and directory handling in the VPN configuration upload interface.
- Fixed an issue that allowed certain user settings to be bypassed, improving overall user control and protection.
Important: After installing this firmware, we strongly recommend performing a factory-default reset to activate every new security adjustment.
Security Enhancements
- Password Policy Upgrade – Minimum of 10 characters, including at least one letter, one digit, and one special character; disallows consecutive identical characters; hardens defense against brute-force attacks.
- HTTPS on 8443 – Management interface now served over TLS by default.
- UPnP Disabled – Universal Plug and Play starts in the off state for reduced surface exposure.
- AiCloud Authentication Hardening (CWE-287) – Added layered verification.
- Authentication Logic Refactor – Removed redundant code paths for a lean sign-in flow.
- Memory Safety Guard (CWE-476) – Introduced null-reference protections across critical services.
- Enhanced IPsec Parameter Validation – The existing input checks have been hardened.
- Data Exposure Mitigation (CWE-200) – Reinforced controls on sensitive pathways.
- Detailed Audit Trails – Expanded logging within the authentication module.
System Improvements
- Connection Stability – Core algorithms refined for steadier links.
- Scheduling Accuracy – Timed tasks execute reliably under PPPoE, PPTP and L2TP WAN modes.
- Client List Maintenance – Resolved an issue that prevented offline devices from being removed from the client list
1. Fixed the UI issue in Chrome.
2. Fixed client binding issues in Mesh scenarios.
3. Enhanced input parameter handling techniques to improve data processing stability and system security.
4. Enhance system access control mechanisms.
1. Strengthened input validation and data processing workflows to further protect information security.
2. Enhanced AiCloud password protection mechanisms, safeguarding against unauthorized access attempts.
3. Enhanced device security through improved buffer handling in connection features.
4. Refined data handling processes, ensuring secure and accurate information management.
5. Enhanced file access control mechanisms, promoting a more secure operating environment.
6. Strengthened certificate protection, providing enhanced data security.
7. Fixed GUI bugs
Please unzip the firmware file, and then verify the checksum.
SHA256: e8c1acc2968961290205f37d4aec80a7d0154faa081c19ba3673a0d1392a3d63
Fixed v6plus related issues and added support for OCN.
Please unzip the firmware file, and then verify the checksum.
SHA256: 61eeb0c6f3db93ab906b18f675cb3400a1a34ae13522604a364807db764f4b50
New features:
-iPhone/Android USB auto backup WAN allows you to connect your phone to the router’s USB port and use it as an internet source. Please refer to https://www.asus.com/support/FAQ/1050074/
-DDNS transfer allows you to transfer your ASUS DDNS hostname from your original router to the new one. Please refer to https://www.asus.com/support/FAQ/1048684/
Security updates:
-Allowed binding DDNS to a user's account to reduce the risk of MITM attacks
-Fixed the cfg server vulnerability.
-Fixed lighttpd vulnerability, CVE-2023-35720.
-Fixed several curl vulnerabilities including CVE-2023-28322, CVE-2023-28321, and CVE-2023-28319.
-Fixed OpenSSL vulnerability, CVE-2023-0464.
-Patched several command injection vulnerabilities.
-Upgraded sqlighte and resolved CVE-2020-11656 / CVE-2019-19646 / CVE-2019-8457 / CVE-2020-11655 / CVE-2018-20505 / CVE-2019-16168 / CVE-2019-19645 / CVE-2020-13435 / CVE-2020-13631 / CVE-2020-13434
Please unzip the firmware file, and then verify the checksum.
SHA256: f88339e2ea8b9ebed6fe548818ef052a6e81c41576c3e4f89eb03deafde6e41f
New features:
-iPhone/Android USB auto backup WAN allows you to connect your phone to the router’s USB port and use it as an internet source. Please refer to https://www.asus.com/support/FAQ/1050074/
-DDNS transfer allows you to transfer your ASUS DDNS hostname from your original router to the new one. Please refer to https://www.asus.com/support/FAQ/1048684/
Security updates:
-Allowed binding DDNS to a user's account to reduce the risk of MITM attacks
-Fixed login password issue in specific SKU.
-Fixed the cfg server vulnerability.
-Fixed lighttpd vulnerability, CVE-2023-35720.
-Fixed several curl vulnerabilities including CVE-2023-28322, CVE-2023-28321, and CVE-2023-28319.
-Fixed OpenSSL vulnerability, CVE-2023-0464.
-Patched several command injection vulnerabilities.
-Upgraded sqlighte and resolved CVE-2020-11656 / CVE-2019-19646 / CVE-2019-8457 / CVE-2020-11655 / CVE-2018-20505 / CVE-2019-16168 / CVE-2019-19645 / CVE-2020-13435 / CVE-2020-13631 / CVE-2020-13434
Please unzip the firmware file, and then verify the checksum.
SHA256: 59c37dfa563a407808e0597460cd3ea2d07606ce8e640f89bb2f15a84a2e2b55
New features:
-iPhone/Android USB auto backup WAN allows you to connect your phone to the router’s USB port and use it as an internet source. Please refer to https://www.asus.com/support/FAQ/1050074/
-DDNS transfer allows you to transfer your ASUS DDNS hostname from your original router to the new one. Please refer to https://www.asus.com/support/FAQ/1048684/
Security updates:
-Allowed binding DDNS to a user's account to reduce the risk of MITM attacks
-Fixed the cfg server vulnerability.
-Fixed lighttpd vulnerability, CVE-2023-35720.
-Fixed several curl vulnerabilities including CVE-2023-28322, CVE-2023-28321, and CVE-2023-28319.
-Fixed OpenSSL vulnerability, CVE-2023-0464.
-Patched several command injection vulnerabilities.
-Upgraded sqlighte and resolved CVE-2020-11656 / CVE-2019-19646 / CVE-2019-8457 / CVE-2020-11655 / CVE-2018-20505 / CVE-2019-16168 / CVE-2019-19645 / CVE-2020-13435 / CVE-2020-13631 / CVE-2020-13434
Please unzip the firmware file, and then verify the checksum.
SHA256: 3af4f36f2c22791783bd14d6b7df9614a49bca45de90b8a06d0b497deece9114
1. Fixed an issue with changing passwords.
2. Fixed bandwidth errors when 5GHz channel is fixed at 116.
3. Improved security by upgrading to SHA256.
4. Added support for disabling 11b on 2.4GHz band
5. Improved DDNS functionality and added HE.NET
6. Improved smart connect function.
7. Added LED on/off feature as Aimesh node.
8. Optimized AiMesh Topology page.
9. Improved Aimesh stability.
Please unzip the firmware file first then check the MD5 code.
MD5: fd9e6ce2178a96ec7d145c4f98464971
1.Improved JP SKU initial setup process.
2.Improved system stability.
3.Fixed multi-language related GUI bugs.
4.Improved AiMesh stability.
5.Fixed IPSec VPN related performance issue.
Please unzip the firmware file first then check the MD5 code.
MD5: e4866c7207666642af3fec8642f01152
1.Improved system stability.
2.Fixed firmware upgrade issue in the latest step of the initial setup process.
3.Fixed web user interface display bugs after disabling wireless.
Please unzip the firmware file first then check the MD5 code.
MD5: 705d5cd3fc0999749c4ec163879a763f
1. Fixed httpd error when turning off the radio.
2. Fixed connection issue when SSID containing space and UTF8 under AiMesh or Repeater mode.
3. Fixed IPv6 manual DNS setting bugs.
4. Fixed UI display error of USB types.
5. Fixed AiMesh related issue.
6. Added new entrance for web GUI http://www.asusrouter.com.
Please unzip the firmware file first then check the MD5 code.
MD5: 7a480d8fa637f6412fd72ed5bf16f399
1. Supported AiMesh function.
2. Fixed IPTV bugs.
3. Fixed WPA2 PSK/WPA3 PSK mix mode issues.
4. Improved system stability.
Please unzip the firmware file first then check the MD5 code.
MD5: 4d2a87085ebb87aa79094795b5b667b2