TAP100 Firmware Downloads: Difference between revisions
no edit summary
Gytispieze (talk | contribs) m (Text replacement - "{{Template:Global_changelog_disclaimer}} ---- <!--NEW_FW-->" to "<!--NEW_FW-->") |
Gytispieze (talk | contribs) No edit summary |
||
(7 intermediate revisions by the same user not shown) | |||
Line 9: | Line 9: | ||
==Changelog== | ==Changelog== | ||
<!--NEW_FW--> | <!--NEW_FW--> | ||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.8/TAP100/TAP100_R_00.07.08_WEBUI.bin TAP100_R_00.07.08]</span></b> | 2024.07.18=== | |||
* <b>New</b> | |||
** <b>Network</b> | |||
*** 802.1X: added client support | |||
** <b>Services</b> | |||
*** Wifi Scanner: added support | |||
** <b>System</b> | |||
*** API Core: added option to configure api session timeout | |||
*** UI Core: added data analytics support | |||
*** Update Firmware: added warning message about device being temporarily unreachable on firmware update | |||
* <b>Improvements</b> | |||
** <b>Network</b> | |||
*** Wireless: added warning when user configures mesh on radio with automatic frequency channel | |||
*** Wireless: added support for wireless MAC-filter MAC ranges | |||
*** Wireless: changed Radius Accounting port is not required when configuring access point with enterprise encryption | |||
*** Wireless: refactored radio configuration page layout | |||
*** Wireless: refactored assignment of wireless interfaces MAC addresses, STA interface will always use fixed address | |||
** <b>Services</b> | |||
*** stunnel: updated version to 5.72 | |||
** <b>System</b> | |||
*** Access Control: added certificate key length warnings | |||
*** Access Control: adjusted access control when all pages are blocked | |||
*** Access Control: added certificate file download for CLI to work on all browsers | |||
*** API Core: implemented functionality to include warning messages for vulnerable certificates | |||
*** RutOS: improved GPL example page to align with new software architecture | |||
*** Troubleshoot: added support for multiple syslog servers | |||
*** UI Core: added additional message with IP address to loading screen for scenarios when redirect to different IP address happens | |||
*** UI Core: added toast message hiding when text is too long | |||
*** Update Firmware: added 'Firmware version' data in screen after firmware upload | |||
*** WebUI: added functionality to cancel loading screen if it takes 30 or more seconds | |||
*** WebUI: removed all ubus method calls from webui | |||
*** WebUI: added password generator for first login modal | |||
*** WebUI: added sticky position to side menu | |||
*** WebUI: added default password hint to login error message | |||
*** WebUI: added warning messages for low-security certificates | |||
*** Kernel: updated version to 5.15.159 | |||
*** libexpat: updated version to 2.6.2 | |||
*** SSL/TLS: updated version to 3.0.14 | |||
*** vue: updated version to 3.4 | |||
* <b>Fix</b> | |||
** <b>Network</b> | |||
*** Network: fixed overriding MAC address for interfaces that are bridged | |||
*** Network: fixed missing default route when static mode is selected | |||
*** Network: fixed tapxxx.rutos.net DNS resolution | |||
*** Wireless: fixed wireless scan results sometimes not being returned | |||
*** Wireless: fixed API POST validation without sending "mode" option | |||
*** Wireless: removed the ability to have different countries in radio configurations | |||
*** Wireless: fixed interface delete when it's unassigned from the wireless interface in access point mode | |||
*** Wireless: fixed backticks for WiFi SSID are not allowed in WebUI | |||
** <b>System</b> | |||
*** Access Control: fixed download certificate button to be visible | |||
*** Administration: fixed repeated validation on cleared inputs and added validation when new password matches the old one | |||
*** API Core: fixed API method validation during upload action | |||
*** API Core: fixed error messages for POST method | |||
*** API Core: fixed option list validation | |||
*** Boot: fixed factory settings restore (firstboot) not deleting hidden files | |||
*** Events Log: fixed refresh button in event log table | |||
*** IP Block: fixed adding MAC addresses back to whitelist when unblocking all of them | |||
*** System Status: fixed wireless MAC address display value if radio is disabled | |||
*** Troubleshoot: fixed system log and kernel log buttons to be enabled with read only rights | |||
*** Update Firmware: fixed misleading "Firmware version" status of "N/A" to "FOTA service is disabled" when FOTA is disabled | |||
*** Update Firmware: fixed issue when infinite spinner appears after updating device firmware from server without having internet connection | |||
* <b>CVE Patches</b> | |||
** Patched CVE-2023-52425 | |||
** Patched CVE-2023-52530 | |||
** Patched CVE-2024-25629 | |||
** Patched CVE-2024-28757 | |||
---- | |||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.7.3/TAP100/TAP100_R_00.07.07.3_WEBUI.bin TAP100_R_00.07.07.3]</span></b> | 2024.06.25=== | |||
* <b>Fix</b> | |||
** <b>Network</b> | |||
*** WebUI: fixed port advertisement change | |||
** <b>System</b> | |||
*** FOTA: fixed config when upgrading from older firmware with keep settings | |||
* <b>CVE Patches</b> | |||
** CVE-2024-31950 | |||
** CVE-2024-31951 | |||
---- | |||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.7.2/TAP100/TAP100_R_00.07.07.2_WEBUI.bin TAP100_R_00.07.07.2]</span></b> | 2024.06.12=== | |||
* <b>Improvements</b> | |||
** <b>Services</b> | |||
*** Wireless: removed unnecessary information from system logs | |||
** <b>System</b> | |||
*** SSH: removed weak SSH algorithms | |||
* <b>Fix</b> | |||
** <b>System</b> | |||
*** IP Block: fixed blocking of UDP traffic | |||
*** Ledman: fixed WiFi LED indication when WiFi configuration is changed | |||
*** Uboot: fixed firmware recovery update via uboot on Windows | |||
* <b>CVE Patches</b> | |||
** CVE-2024-31948 | |||
---- | |||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.7.1/TAP100/TAP100_R_00.07.07.1_WEBUI.bin TAP100_R_00.07.07.1]</span></b> | 2024.05.03=== | |||
---- | |||
* <b>New</b> | |||
** <b>System</b> | |||
*** WebUI: added the ability to generate random passwords for password input fields | |||
*** WebUI: added reset to “Factory defaults” option | |||
*** System: changed firmware certificate verification tool | |||
*** IP Block: added time-based login attempt blocking | |||
*** WebUI: added firmware update notification support | |||
*** Logging: added multiple remote syslog servers support | |||
* <b>Improvements</b> | |||
** <b>Services</b> | |||
*** WebUI: moved licenses to footer | |||
** <b>System</b> | |||
*** WebUI: adjusted responsive design breakpoints | |||
*** WebUI: added more strict password requirements for restoring backup | |||
*** WebUI: changed firmware update option to server as a default option | |||
*** WebUI: improved first login password change logic | |||
*** GPL: added offline package preparation command for GPL builds | |||
*** Kernel: updated to version 5.15.149 | |||
*** Libcap: updated package version to 2.69 | |||
* <b>Fix</b> | |||
** <b>System</b> | |||
*** WebUI: fixed an issue when a user was not logged out after changing profiles | |||
*** CLI: fixed enter key issue on mobile chromium based browsers | |||
* <b>CVE Patches</b> | |||
** CVE-2022-4603 | |||
** CVE-2022-23308 | |||
** CVE 2022-45061 | |||
** CVE-2023-0466 | |||
** CVE-2023-6129 | |||
** CVE-2023-7042 | |||
** CVE 2023-24329 | |||
** CVE 2023-27043 | |||
** CVE-2023-42366 | |||
** CVE-2023-46218 | |||
** CVE-2023-46219 | |||
** CVE-2023-46752 | |||
** CVE-2023-46753 | |||
** CVE-2023-48795 | |||
** CVE-2024-2397 | |||
** CVE-2024-25062 | |||
** CVE-2024-27913 | |||
** CVE-2024-22365 | |||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.10/TAP100/TAP100_R_00.07.06.10_WEBUI.bin TAP100_R_00.07.06.10]</span></b> | 2024.04.04=== | ===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.10/TAP100/TAP100_R_00.07.06.10_WEBUI.bin TAP100_R_00.07.06.10]</span></b> | 2024.04.04=== | ||
---- | ---- | ||
Line 139: | Line 275: | ||
*** Patched CVE-2023-29469 vulnerability | *** Patched CVE-2023-29469 vulnerability | ||
*** Patched CVE-2023-31490 vulnerability | *** Patched CVE-2023-31490 vulnerability | ||
*** Patched CVE- | *** Patched CVE-2021-36369 vulnerability | ||
*** Patched CVE-2023-48174 vulnerability | *** Patched CVE-2023-48174 vulnerability | ||
*** Fixed Events Log database rotation to prevent log partition space exhaustion | *** Fixed Events Log database rotation to prevent log partition space exhaustion |