ASUS ZenWiFi AC (CT8)
BIOS & FIRMWARE
- Driver & Tools
- BIOS & FIRMWARE
Security:
1. Fixed Stored XSS.
2. Fixed CVE-2022-26376.
Features:
1. Fixed AiMesh issues.
2. Fixed download master related issues.
3. Fixed VPN unable to access internet while enabling QoS.
Please unzip the firmware file first then check the MD5 code.
MD5: 0cebe03df8db3363c3a849e3379aeeec
Change log:
1. Fix device unable to connect to mesh node 2.4GHz.
2. Minor GUI bug fixes.
3. Added more ISP profile
Digi 1 - TM
Digi 2 - TIME
Digi 3 - Digi
Digi 4 - CTS
Digi 5 - ALLO
Digi 6 - SACOFA
Maxis - CTS
Maxis - SACOFA
Maxis - TNB/ALLO
Security
- Fixed string format stacks vulnerability
- Fixed cross-site-scripting vulnerability
- Fixed informational vulnerability.
Thanks to Howard McGreehan.
-Fixed SQL injection vulnerability
-Fixed json file traversal vulnerability
-Fixed plc/port file traversal vulnerability
-Fixed stack overflow vulnerability
Thanks to HP of Cyber Kunlun Lab
-Fixed authenticated stored XSS vulnerability
Thanks to Luke Walker – SmartDCC
-Fixed LPD denial of service vulnerability
-Fixed cfgserver heap overflow vulnerability
-Fixed cfgserver denial of service vulnerability
Thanks to TianHe from BeFun Cyber Security Lab.
Please unzip the firmware file first then check the MD5 code.
MD5:d7ba4b933360437d0ad68110c09c203c
1. AiMesh 2.0
- System optimization: one click in AiMesh to optimize the topology
- System Ethernet backhaul mode, all nodes will only connect by ethernet, all bands will be released for wireless clients.
- System factory default and reboot.
- Client device reconnect, make the device to offline and online again.
- Client device binding to specific AP.
- Guest WiFi on all Mesh nodes (all node need to upgrade to 3.0.0.4.386 firmware)
- Access nodes USB application.
Connection priority and Ethernet backhaul mode introduction
https://www.asus.com/support/FAQ/1044184
How to setup ASUS AiMesh or ZenWiFi Mesh Ethernet backhaul under different conditions
https://www.asus.com/support/FAQ/1044151/
2. New Family interface in ASUS router App.
ASUS Router App for iOS must greater or equal to iOS v1.0.0.5.75
Android version greater or equal to v1.0.0.5.74
3. The unit of the WiFi time scheduler goes to 1 minute.
4. Support IPSec IKE v1 and IKE v2, and you can use the Windows 10 native VPN client program to connect to the router's IPSec VPN server. The Windows 10 new FAQ is in https://www.asus.com/support/FAQ/1033576
5. 2.4 and 5G on the network map could be configured in the same tab.
6. Captcha for login can be disabled in administration -> system.
7. Printer server port can be disabled on the USB app page.
8. Clients which connect to the guest network can be viewed in the network map -->view list --> interface
9. Fix Let's Encrypt not working properly.
10. Add IPTV supports for specific region.
Security fixes:
1. Fixed CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687, CVE-2020-25684, CVE-2020-25685, CVE-2020-25686
2. Fixed DoS vulnerability. Thanks for Tsinghua University NISL's contribution.
3. Fixed DoS vulnerability from spoofed sae authentication frame. Thanks for Efstratios Chatzoglou, University of the Aegean, Georgios Kambourakis, European Commission at the European Joint Research Centre, and Constantinos Kolias, University of Idaho.
4. Fixed Stored XSS vulnerability.
5. .Fixed CVE-2021-41435, CVE-2021-41436.
Thanks to Efstratios Chatzoglou, University of the Aegean
6. BusyBox
- CVE-2016-2148
- CVE-2016-6301
- CVE-2018- 1000517
7. cURL
- CVE-2020-8169
- CVE-2019-5481
- CVE-2019-5482
- CVE-2018-1000120
- CVE-2018- 1000300
- CVE-2018-16839
8. Lighttpd
- CVE-2018-19052
9. Linux
- CVE-2020-14305
- CVE-2020-25643
- CVE-2019-19052
10. lldpd
- CVE-2020-27827
11. Avahi
- CVE-2017-6519
12. hostapd
- CVE-2021-30004
- CVE-2019-16275
13. OpenVPN
- CVE-2020-11810
- CVE-2020-15078
14. wpa
- CVE-2021-30004
- CVE-2021-27803
- CVE-2019-11555
- CVE-2019-9499
- CVE-2019-9498
- CVE-2019-9497
- CVE-2019-9496
- CVE-2019-9495
- CVE-2019-9494
- CVE-2017-13086
- CVE-2017-13084
- CVE-2017-13082
- CVE-2016-4476
- CVE-2015-8041
15. Fixed httpd vulnerability
Thanks to Wei Fan contribution.
16. Fixed stack overflow vulnerability
17. Fixed DoS vulnerability
Thanks to 360 Future Security Lab's contribution.
Please unzip the firmware file first then check the MD5 code.
MD5:1ea263bfdf97fd5e608ddebb27b1804d
1. Fixed device list abnormal due to random mac address.
2. Improved system stability.
3. Fixed Alexa/IFTTT features not work properly.
4. Security fix: Fixed CVE-2020-12695 CallStranger.
5. Security: Fixed buffer Overflow With Shellcode.
6. Security: Fixed CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687, CVE-2020-25684, CVE-2020-25685, CVE-2020-25686
7. Modified language supports for some regions.
8. Minor GUI bug fixes.
Please unzip the firmware file first then check the MD5 code.
MD5: feac80c452361f2b100e156a0a289e82
- Improve WiFi stability.
- Fix wireless scheduler issue.
- Fix minor GUI issues.
- Fix OpenVPN related issues.
- Fix AiCloud issues when streaming music.
Please unzip the firmware file first then check the MD5 code.
MD5: 219d89aeb051e853337481cad3b3a3e6
Update Adaptive QoS categories: Help you to prioritize the mission-critical applications
Those people who work-from-home & learn-from-home will greatly benefit from this new feature with optimized streaming experiences.
New Supported Categories & Apps:
- Video conferencing, including Microsoft Teams®, ZOOM®, Skype®, Google Hangouts®, BlueJeans®
- Online learning, including Khan academy®, Udemy®, Coursera®, TED®, VIPKiD®, 51Talk®, XDF®, Xueersi®
- Streaming, including YouTube®, Netflix®, HBO NOW®, Amazon Prime Video®, Disney+®, ESPN®, MLB.com®, iQIY®
- Indoor training, including Zwift®, Peloton®, Onelap®
Stay tuned and more apps are coming to the list soon!
Please unzip the firmware file first and then check the MD5 code.
MD5: 679b4b94c48d9518204fa3d9ee278fff
- Improved performance and stability.
- Improved roaming mechanism.
- Fixed LED related bugs.
- Updated multiple languages.
Please unzip the firmware file first then check the MD5 code.
MD5: d65f3d3e0df1bcd893ee37fd35f6cb9
The first version of firmware for ZenWiFI_CT8
Please unzip the firmware file first then check the MD5 code.
MD5: da0bffef980ae8f37904768788b9f7cd