RT-AX82U
BIOS & FIRMWARE
- Driver & Tools
- BIOS & FIRMWARE
Bug Fixes and Enhancements:
- Improved AiMesh system stability for more reliable connections.
- Fixed UI bugs in AiMesh topology.
- Resolved issues with AiMesh nodes using Ethernet backhaul for consistent performance.
- Addressed v6plus-related issues to ensure seamless connectivity.
- Corrected a display issue in the OpenVPN server that prevented IPv6 settings from showing correctly.
- Enhanced LAN IPv6 DNS server validation for better network reliabilitys.
- Fixed GUI icons and setup-related issues for an improved user experience.
- Resolved a GUI bug that occurred when adding port range rules in the Network Service Filter.
- Added DS-Lite Support.
- Fixed USB function related issues.
- Optimized memory utilization and fixed an occasional server error when registering DDNS with an app.
- Improved stability and consistent display of client status on the WireGuard server.
- Resolved WAN connection issues for a stable internet connection.
Security Updates:
- Applied patches for CVE-2023-5678 & CVE-2024-0727.
- Enhanced security in OpenVPN Custom Configuration for(CVE-2024-0401).
- Addressed CVE-2023-48795 by updating the dropbear SSH server.
- Updated StrongSwan to version 5.9.13 to address CVE-2023-41913.
- Resolved CVE-2020-13848 by updating libupnp to version 1.3.1.
- Fixed OpenSSL and command injection vulnerabilities.
- Upgraded to the latest dropbear version.
- Fixed a stack overflow vulnerability.
- Fixed XSS potentially via malformed hostname in DHCP request.
- Fixed vulnerability in command injection after authentication.
Please unzip the firmware file, and then verify the checksum.
SHA256: b240b1b2c87fbf9dc97897f03db92656bc049c53c693a42b3877955f934373d3
- Resolved guest network connectivity issues on AiMesh nodes by disabling guest network internal access.
Please unzip the firmware file, and then verify the checksum.
SHA256: 7372a72acb04401ffd89117469b258558dcb799dad48d211ec72724e2a8dc639
Bug Fixes and Enhancements:
- Fixed v6plus related Issues.
- Fixed ipv6 network service filter not work.
- Resolved an issue that caused hostname errors in the DDNS service.
- Resolved OpenVPN Server TAP mode issue.
- Fixed the problem that the AiCloud app cannot add router on Android 9.
- Ensured consistent display of client status on the WireGuard server.
- Enhanced system stability when accessing the WireGuard Server with DMZ enabled.
- Improved stability when enabling or disabling the WireGuard server.
- Optimized memory utilization and fixed an occasional server error when registering DDNS with an app.
- Corrected a bug encountered when adding a rule to the network services filter.
Security Fixes:
- Fixed several curl vulnerabilities.
- Fixed FFmpeg vulnerabilities.
- Corrected an OpenVPN vulnerability categorized as CWE-134.
- Strengthened protection against SSH brute force attacks.
- Fixed OpenSSL vulnerabilities.
Please unzip the firmware file, and then verify the checksum.
SHA256: fec6ea6bf7b32dad25ceda9cbdbb187b6d29bbfeaeb23768184ef63a6d379ad0
New features:
-Built-in Surfshark in VPN Fusion allows you to surf the internet anonymously and securely from anywhere by encrypting connections. Please refer to https://asus.click/SurfsharkVPN
-iPhone/Android USB auto backup WAN allows you to connect your phone to the router’s USB port and use it as an internet source. Please refer to https://asus.click/AutobackupWAN
-DDNS transfer allows you to transfer your ASUS DDNS hostname from your original router to the new one. Please refer to https://asus.click/ASUSDDNS
Bug fixes and functionality modifications:
-Resolved the issue with login and password changes.
-Resolved the IPSec VPN connection issues.
-Resolved the Instant Guard connection issues.
-Fixed the AiCloud login issue after unplugging and plugging the HDD into the USB port.
-Fixed the issue where Traffic Analyzer sometimes couldn't record data.
-Fixed the time display issue for the preferred upgrade time in the Auto Firmware Upgrade function.
-Fine-tuned the description for port status.
-Enabled DynDNS and No-IP DDNS to use IPv6.
-Fixed AiMesh preferred AP identification in site survey results.
-Updated timezone list for Greenland, Mexico, and Iran.
-Modified the USB application option text in dual WAN.
-Allowed WireGuard Server clients to access the Samba server.
-Fixed memory leak issue.
-Enabled the failback function when using the iOS/Android USB backup WAN.
-The ARP response issue has been resolved, along with the connection issue between the router and the ROG Phone 6 and 7.
-Resolved the issue where the USB path is not displayed on the Media Server page in the AiMesh node
Security updates:
-Enabled and supported ECDSA certificates for Let's Encrypt.
-Enhanced protection for credentials.
-Enhanced protection for OTA firmware updates.
-Fixed DoS vulnerabilities in firewall configuration pages. Thanks to Jinghe Gao's contribution.
-Fixed DoS vulerabilities in httpd. Thanks to Howard McGreehan.
-Fixed information disclosure vulnerability. Thanks to Junxu (Hillstone Network Security Research Institute) contribution.
-Fixed CVE-2023-28702 and CVE-2023-28703. Thanks to Xingyu Xu(@tmotfl) contribution.
-Fixed null pointer dereference vulnerabilities. Thanks to Chengfeng Ye, Prism Research Group - cse hkust contribution.
-Fixed the cfg server vulnerability. Thanks to Swing and Wang Duo from Chaitin Security Research Lab.
-Fixed the vulnerability in the logmessage function. Thanks to Swing and Wang Duo from Chaitin Security Research Lab C0ss4ck from Bytedance Wuheng Lab, Feixincheng from X1cT34m.
Please unzip the firmware file, and then verify the checksum.
SHA256: 50a894191b38b7f58afd9d65e414951e47370a8018ec212c6e731a2b01a06b35
1.Fixed CVE-2022-46871
2.Fixed Client DOM Stored XSS.
3.Improved AiMesh backhaul stability.
4.Fixed AiMesh topology UI bugs.
5.Fixed the reboot issue when assigning specific clients in VPN fusion.
6.Fixed the VPN fusion bug when importing the Surfshark WireGuard conf file.
7.Fixed network map bugs.
Please unzip the firmware file first then check the MD5 code.
MD5: 65d760c3b08af461998fe0b5c870e424
If you want to upload the firmware file manually, please check your RT-AX82U firmware version is greater or equal to 3.0.0.4.386.50289. If not, please manual upgrade your RT-AX82U to 3.0.0.4.386.50289 first.
Instead of manual upgrade the firmware, we suggest you to upgrade the firmware through live update function by clicking the check firmware version in the ASUS router app--> Settings --> firmware upgrade.
Or click the check button in web GUI --> Administration --> Firmware upgrade.
Release notes:
Try more on ASUSWRT 2022 with new features at https://asus.click/ASUSWRT2022
1. Supported WireGuard VPN server and client.
2. Supported VPN fusion. It can easily achieve VPN connection to network devices like Smart TV, Game consoles and without installing the VPN client software.
3. Supported new devices connection notification.
4. Supported connection diagnostic on the ASUS router app.
5. Supported Instant Guard 2.0 which helps easily invite family or friends to join the VPN connection.
6. Upgraded parental control and added reward, new scheduler for flexible setting
7. Fixed USB icon issue in port status.
8. Fixed HTTP response splitting vulnerability. Thanks to Efstratios Chatzoglou, University of the Aegean.
9. Fixed status page HTML vulnerability. Thanks to David Ward.
10. Fixed CVE-2018-1160. Thanks to Steven Sroba.
11. Fixed CVE-2022-35401 authentication bypass vulnerability.
12. Fixed CVE-2022-38105 information disclosure vulnerability in CM process.
13. Fixed CVE-2022-38393 DoS vulnerability in cfg_server.
Please unzip the firmware file first then check the MD5 code.
MD5: 862d8ddace51e4c2ff48ce4feb3ea598
The version is a middle firmware for upgrading from 3.0.0.4.386.49674 (or a lower version) to 3.0.0.4.388.2xxxx.
We suggested updating the firmware by clicking the check firmware in the ASUS router app or web GUI, and you don't need to update the firmware to this version manually.
Please unzip the firmware file first then check the MD5 code.
MD5: 5c4a459a40d17b02ff31421298db0d5a
Improved connection stability.
Please unzip the firmware file first then check the MD5 code.
MD5: a362b7fbb85503a9cc611dd50832a40b
1. Improved system stability
2. Supported Safe Browsing in the router app to filter explicit content from search results. You can set it in the router app --> Devices or Family.
3. Fixed anumalous 802.11 frame issues.
Thanks to Kari Hulkko and Tuomo Untinen from The Synopsys Cybersecurity Research Center (CyRC).
Issue was found by using Defensics Fuzz Testing Tool.
4. Fixed CVE-2022-26376
Please unzip the firmware file first then check the MD5 code.
MD5: f7e07598e0da86cac73dce8ee54aea1d
1. Fixed OpenSSL CVE-2022-0778
2. Fixed CVE-2021-34174, CVE-2022-0778
3. Added more security measures to block malware.
4. Fixed Stored XSS vulnerability. Thanks to Milan Kyselica of IstroSec.
5. Fixed CVE-2022-23970, CVE-2022-23971, CVE-2022-23972, CVE-2022-23973, CVE-2022-25595, CVE-2022-25596, CVE-2022-25597, CVE-2022-26673, CVE-2022-26674
6. Added 3rd party DNS server list in WAN --> DNS to help users enhance the connection security.
Please unzip the firmware file first then check the MD5 code.
MD5: f04897a4f50a4eccd6360ece01c6ca14
Security
- Fixed string format stacks vulnerability
- Fixed cross-site-scripting vulnerability
- Fixed informational vulnerability.
Thanks to Howard McGreehan.
-Fixed SQL injection vulnerability
-Fixed json file traversal vulnerability
-Fixed plc/port file traversal vulnerability
-Fixed stack overflow vulnerability
Thanks to HP of Cyber Kunlun Lab
-Fixed authenticated stored XSS vulnerability
Thanks to Luke Walker – SmartDCC
-Fixed LPD denial of service vulnerability
-Fixed cfgserver heap overflow vulnerability
-Fixed cfgserver denial of service vulnerability
Thanks to TianHe from BeFun Cyber Security Lab.
Added more ISP profile
Digi 1 - TM
Digi 2 - TIME
Digi 3 - Digi
Digi 4 - CTS
Digi 5 - ALLO
Digi 6 - SACOFA
Maxis - CTS
Maxis - SACOFA
Maxis - TNB/ALLO
Fixed AiMesh guest network issues.
Fixed DDNS issues where the WAN IP is IPv6
Fixed UI bugs in Administration --> feedback.
Fixed time zone error.
Improved the connection stability.
Please unzip the firmware file first then check the MD5 code.
MD5:d2deab6adbbb2c89545dffb662eae3ee
1.Fixed Let's encrypt bugs
2.Fixed httpd vulnerability
3.Fixed stack overflow vulnerability
4.Fixed DoS vunerability
Thanks for the contribution of Fans0n、le3d1ng、Mwen、daliy yang from 360 Future Security Labs
Please unzip the firmware file first then check the MD5 code.
MD5:ae8051c49bf029e9cffaa9ca0c1bb79c
1. Fixed AiMesh web page multi-language issues.
2. Fixed Let's encrypt issues.
3. Fixed Stored XSS vulnerability.
4. Fixed CVE-2021-41435, CVE-2021-41436.
Thanks to Efstratios Chatzoglou, University of the Aegean
Georgios Kambourakis, European Commission at the European Joint Research Centre
Constantinos Kolias, University of Idaho.
5. Fixed Stack overflow vulnerability. Thanks to Jixing Wang (@chamd5) contribution.
6. Fixed information disclosure vulnerability .Thanks to CataLpa from DBappSecurity Co.,Ltd Hatlab and 360 Alpha Lab contribution.
Please unzip the firmware file first then check the MD5 code.
MD5: dde122f99e00d5a2e6f7b918fd804bdf
This version includes several vulnerability patches.
BusyBox
- CVE-2016-2148
- CVE-2016-6301
- CVE-2018- 1000517
cURL
- CVE-2020-8169
- CVE-2019-5481
- CVE-2019-5482
- CVE-2018-1000120
- CVE-2018- 1000300
- CVE-2018-16839
Lighttpd
- CVE-2018-19052
Linux
- CVE-2020-14305
- CVE-2020-25643
- CVE-2019-19052
lldpd
- CVE-2020-27827
Avahi
- CVE-2017-6519
hostapd
- CVE-2021-30004
- CVE-2019-16275
OpenVPN
- CVE-2020-11810
- CVE-2020-15078
wpa
- CVE-2021-30004
- CVE-2021-27803
- CVE-2019-11555
- CVE-2019-9499
- CVE-2019-9498
- CVE-2019-9497
- CVE-2019-9496
- CVE-2019-9495
- CVE-2019-9494
- CVE-2017-13086
- CVE-2017-13084
- CVE-2017-13082
- CVE-2016-4476
- CVE-2015-8041
Fixed DoS vulnerability from spoofed sae authentication frame. Thanks to Efstratios Chatzoglou, University of the Aegean, Georgios Kambourakis, European Commission at the European Joint Research Centre, and Constantinos Kolias, University of Idaho.
Fixed envrams exposed issue. Thanks to Quentin Kaiser from IoT Inspector Research Lab contribution.
Please unzip the firmware file first then check the MD5 code.
MD5: bde1aafd13cbacbeb173391fc8c24419
1. Fix AiMesh issues.
2. Improve system stability.
3. Fix WAN DNS setting cannot setup LAN side pihole server.
4. Modify few IPTV settings.
5. Add JPNE v6plus support.
6. Add Google assistant support. (app version later than 1.0.0.6.38)
Please unzip the firmware file first then check the MD5 code.
MD5: ec6e15c7104b1cb00a72af7f01c8591f
1.Fixed the FragAttack vulnerability.
2.Fixed DoS vulnerability. Thanks for Tsinghua University NISL's contribution.
3.Improved system stability.
4.Fixed GUI bugs.
5.Security Fixed: CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687, CVE-2020-25684, CVE-2020-25685, CVE-2020-25686
Please unzip the firmware file first then check the MD5 code.
MD5: 6fff293108f2b6f398932bd96cb80475
Security Fixed:
Fixed CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687, CVE-2020-25684, CVE-2020-25685, CVE-2020-25686
Please be noted this is a quick fix beta version for DNSmasq vulnerabilities. Refer to "Method 2: Update Manually" in https://www.asus.com/support/FAQ/1008000 to update this firmware.
Please unzip the firmware file first then check the MD5 code.
MD5: 6e581237f8c272fa7e0c82879f3bc1e9
1. AiMesh 2.0
- System optimization: one click in AiMesh to optimize the topology
- System Ethernet backhaul mode, all nodes will only connect by ethernet, all bands will be released for wireless clients.
- System factory default and reboot.
- Client device reconnect, make the device to offline and online again.
- Client device binding to specific AP.
- Guest WiFi on all Mesh nodes (all node need to upgrade to 3.0.0.4.386 firmware)
- Access nodes USB application.
Connection priority and Ethernet backhaul mode introduction
https://www.asus.com/support/FAQ/1044184
How to setup ASUS AiMesh or ZenWiFi Mesh Ethernet backhaul under different conditions
https://www.asus.com/support/FAQ/1044151/
2. New Family interface in ASUS router App.
ASUS Router App for iOS must greater or equal to iOS v1.0.0.5.75
Android version greater or equal to v1.0.0.5.74
3. The unit of the WiFi time scheduler goes to 1 minute.
4. Support IPSec IKE v1 and IKE v2, and you can use the Windows 10 native VPN client program to connect to the router's IPSec VPN server. The Windows 10 new FAQ is in https://www.asus.com/support/FAQ/1033576
5. 2.4 and 5G on the network map could be configured in the same tab.
6. Captcha for login can be disabled in administration -> system.
7. Printer server port can be disabled on the USB app page.
8. Clients which connect to the guest network can be viewed in the network map -->view list --> interface
9. Fixed Let's Encrypt not working properly.
10. Added IPTV supports for specific region.
Please unzip the firmware file first then check the MD5 code.
MD5: 2cf4bc6aef0e8e6b03eb227b9e306936
- Fix IPTV issues for specific regions.
- Update language support list for specific regions.
- Improve system stability.
- Minor GUI bug fixes.
Please unzip the firmware file first then check the MD5 code.
MD5: d4aa507482075683616d501d9429af17
Improve system stability
Please unzip the firmware file first then check the MD5 code.
MD5: 0c8773d0374a273174898c3202545488
- Fixed language display issue.
- Fixed Game boost related issue.
Please unzip the firmware file first then check the MD5 code.
MD5: 64baecb8a8bcf14baaef05dd0c4db9c0
- Fixed UI bugs that happen only in IE11.
- Fixed QIS auto-detection issue.
- Improved UI compatibility issues on different resolutions.
Please unzip the firmware file first then check the MD5 code.
MD5: 85ca300f00dcf5d5cb8241068a756fca
- Fixed LED abnormal issue.
- Fix CallStranger vulnerability (CVE-2020-12695).
- Improve system stability
Please unzip the firmware file first then check the MD5 code.
MD5: 53af7b5b06a1cb125c1932eab0548788
- Add Aura RGB control.
- Fix Let's encrypt certification issue.
- Stability improvement.
Please unzip the firmware file first then check the MD5 code.
MD5: 734fec6771a2fecee7540a2d31900ea6
Initial release
Please unzip the firmware file first then check the MD5 code.
MD5: ca398a5d925aaaed935aa95f346c4b60