TAP200 Firmware Downloads: Difference between revisions

From Teltonika Networks Wiki
No edit summary
No edit summary
 
(29 intermediate revisions by 2 users not shown)
Line 8: Line 8:


==Changelog==
==Changelog==
<!--NEW_FW-->
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.10.2/TAP200/TAP200_R_00.07.10.2_WEBUI.bin TAP200_R_00.07.10.2]</span></b> | 2024.11.04===
* Firmware includes no changes for this device
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.10/TAP200/TAP200_R_00.07.10_WEBUI.bin TAP200_R_00.07.10]</span></b> | 2024.10.10===
* <b>New</b>
** <b>Services</b>
*** RMS: added SOCKS5 proxy support
* <b>Improvements</b>
** <b>Network</b>
*** Curl: added unix socket support
*** Network: improved performance under stateless single-directional traffic (RFC2544)
*** Wireless: added interface status message when DFS CAC is in progress
** <b>System</b>
*** Access Control: refactored 'General', 'Security' web pages
*** Auto Reboot: added support for multiple hosts/URLs in Ping/Wget Reboot
*** Backup: encrypting backup does not require 7zip package anymore
*** WebUI: added ability to open new page in new tab without entering user credentials
*** WebUI: improved SDK example application
*** Glib2: updated version to 2.80.5
*** Kernel: updated version to 5.10.224
*** Ncurses: updated version to 6.5
* <b>Fix</b>
** <b>Network</b>
*** Wireless: fixed showing incorrect transmit power
*** Wireless: fixed hostapd ubus call timeout after wireless configuration change
** <b>Services</b>
*** Ledman: fixed issue when power LED turns off when rebooting device
** <b>System</b>
*** CLI: fixed some private IPs being incorrectly determined as public
*** JSON-RPC: fixed login "Access Denied" error
*** WebUI: fixed 'Memory' status card progress bars visuals
*** WebUI: fixed search bar suggestions after removing packages
*** WebUI: fixed custom SDK pages not loading correctly
* <b>CVE Patches</b>
** CVE-2021-3520
** CVE-2021-44540
** CVE-2021-44541
** CVE-2024-4032
** CVE-2024-6119
** CVE-2024-6232
** CVE-2024-6923
** CVE-2024-7264
** CVE-2024-42225
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.9.4/TAP200/TAP200_R_00.07.09.4_WEBUI.bin TAP200_R_00.07.09.4]</span></b> | 2024.10.02===
* <b>Improvements</b>
** <b>Services</b>
*** NTP Client: changed default NTP servers
* <b>Fix</b>
** <b>Services</b>
*** NTP Client: fixed NTP server usage to work with next in line server if current server does not respond
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.9.3/TAP200/TAP200_R_00.07.09.3_WEBUI.bin TAP200_R_00.07.09.3]</span></b> | 2024.09.27===
* Firmware includes no changes for this device
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.9.1/TAP200/TAP200_R_00.07.09.1_WEBUI.bin TAP200_R_00.07.09.1]</span></b> | 2024.09.13===
* <b>Improvements</b>
** <b>Services</b>
*** Python3: updated version to 3.11.7
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.9/TAP200/TAP200_R_00.07.09_WEBUI.bin TAP200_R_00.07.09]</span></b> | 2024.09.03===
* <b>New</b>
** <b>Network</b>
*** Wireless: added option to enable 802.11w Management frame protection when using non-WPA3 encryption
** <b>System</b>
*** WebUI: added notifications menu
* <b>Improvements</b>
** <b>Network</b>
*** Wireless: increased EAP authentication logging
*** Wireless: added insecure configuration warnings when configuring SSIDs
*** Wireless: updated wireless cards to display each radio device's signal quality and band data
*** Wireless: reduced time required for Fast Transition in STA mode
** <b>System</b>
*** Access Control: improved system user's access control rules logic
*** Access Control: added option to disable password auth for the root user
*** Backup: improved backup page by splitting it into backup and reset settings page
*** Update Firmware: changed firmware update log to include firmware version
*** WebUI: updated firmware and backup verification pages design
*** WebUI: improved global alerts display
*** WebUI: adjusted overview page layout design
*** Kernel: updated version to 5.10.221
* <b>Fix</b>
** <b>Network</b>
*** Wireless: fixed wireless status API response to contain separate interface information for multiple radio configurations
** <b>System</b>
*** API Core: fixed file deletion
*** Troubleshoot: fixed troubleshoot not including all the log files when log to flash is enabled
*** User Settings: fixed page to show groups and users if the user has been granted access
*** WebUI: fixed overview page to display active wireless (WLAN) clients
* <b>CVE Patches</b>
** CVE-2021-32292
** CVE-2022-40617
** CVE-2023-49441
** CVE-2024-0397
** CVE-2024-3596
** CVE-2024-5535
** CVE-2024-8088
** CVE-2024-26669
** CVE-2024-26739
** CVE-2024-26740
** CVE-2024-36901
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.8.2/TAP200/TAP200_R_00.07.08.2_WEBUI.bin TAP200_R_00.07.08.2]</span></b> | 2024.08.12===
* <b>Fix</b>
** <b>System</b>
*** Update Firmware: fixed inconsistent firmware download from FOTA
----
===<b>TAP200_R_00.07.08.1</b> | 2024.08.06===
<b>Note:</b> This firmware version was removed due to an issue with FOTA firmware download.
* <b>Fix</b>
** <b>Network</b>
*** Network: fixed default route not being added for PPPoE connections
** <b>System</b>
*** WebUI: fixed SDK WebUI package compilation
----
===<b>TAP200_R_00.07.08</b> | 2024.07.18===
<b>Note:</b> This firmware version was removed due to an issue with FOTA firmware download.
* <b>New</b>
** <b>Network</b>
*** 802.1X: added client support
** <b>Services</b>
*** Wifi Scanner: added support
** <b>System</b>
*** API Core: added option to configure api session timeout
*** UI Core: added data analytics support
*** Update Firmware: added warning message about device being temporarily unreachable on firmware update
* <b>Improvements</b>
** <b>Network</b>
*** Wireless: added warning when user configures mesh on radio with automatic frequency channel
*** Wireless: added support for wireless MAC-filter MAC ranges
*** Wireless: changed Radius Accounting port is not required when configuring access point with enterprise encryption
*** Wireless: enabled ACS(automatic channel selection) for 5 GHz radios by default
*** Wireless: refactored radio configuration page layout
*** Wireless: refactored assignment of wireless interfaces MAC addresses, STA interface will always use fixed address
** <b>Services</b>
*** stunnel: updated version to 5.72
** <b>System</b>
*** Access Control: added certificate key length warnings
*** Access Control: adjusted access control when all pages are blocked
*** Access Control: added certificate file download for CLI to work on all browsers
*** API Core: implemented functionality to include warning messages for vulnerable certificates
*** Boot: enabled HW watchdog in bootloader
*** RutOS: improved GPL example page to align with new software architecture
*** Troubleshoot: added support for multiple syslog servers
*** UI Core: added additional message with IP address to loading screen for scenarios when redirect to different IP address happens
*** UI Core: added toast message hiding when text is too long
*** Update Firmware: added 'Firmware version' data in screen after firmware upload
*** WebUI: added functionality to cancel loading screen if it takes 30 or more seconds
*** WebUI: removed all ubus method calls from webui
*** WebUI: added password generator for first login modal
*** WebUI: added sticky position to side menu
*** WebUI: added default password hint to login error message
*** WebUI: added warning messages for low-security certificates
*** Kernel: updated version to 5.10.217
*** libexpat: updated version to 2.6.2
*** SSL/TLS: updated version to 3.0.14
*** vue: updated version to 3.4
* <b>Fix</b>
** <b>Network</b>
*** Network: fixed overriding MAC address for interfaces that are bridged
*** Network: fixed missing default route when static mode is selected
*** Network: fixed tapxxx.rutos.net DNS resolution
*** Wireless: fixed wireless scan results sometimes not being returned
*** Wireless: fixed 5 GHz Wi-Fi scanning is prohibited when a DFS channel and ETSI regulatory domain is selected
*** Wireless: fixed Wi-Fi 5 GHz unsupported channel selection issue on specific widths
*** Wireless: fixed API POST validation without sending "mode" option
*** Wireless: removed the ability to have different countries in radio configurations
*** Wireless: fixed interface delete when it's unassigned from the wireless interface in access point mode
*** Wireless: fixed backticks for WiFi SSID are not allowed in WebUI
** <b>System</b>
*** Access Control: fixed download certificate button to be visible
*** Administration: fixed repeated validation on cleared inputs and added validation when new password matches the old one
*** API Core: fixed API method validation during upload action
*** API Core: fixed error messages for POST method
*** API Core: fixed option list validation
*** Boot: fixed factory settings restore (firstboot) not deleting hidden files
*** Events Log: fixed refresh button in event log table
*** IP Block: fixed adding MAC addresses back to whitelist when unblocking all of them
*** System Status: fixed wireless MAC address display value if radio is disabled
*** Troubleshoot: fixed system log and kernel log buttons to be enabled with read only rights
*** Update Firmware: fixed misleading "Firmware version" status of "N/A" to "FOTA service is disabled" when FOTA is disabled
*** Update Firmware: fixed issue when infinite spinner appears after updating device firmware from server without having internet connection
* <b>CVE Patches</b>
** Patched CVE-2023-52425
** Patched CVE-2023-52530
** Patched CVE-2024-25629
** Patched CVE-2024-28757
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.7.3/TAP200/TAP200_R_00.07.07.3_WEBUI.bin TAP200_R_00.07.07.3]</span></b> | 2024.06.25===
* <b>Fix</b>
** <b>Network</b>
*** WebUI: fixed port advertisement change
** <b>System</b>
*** FOTA: fixed config when upgrading from older firmware with keep settings
* <b>CVE Patches</b>
** CVE-2024-31950
** CVE-2024-31951
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.7.2/TAP200/TAP200_R_00.07.07.2_WEBUI.bin TAP200_R_00.07.07.2]</span></b> | 2024.06.12===
* <b>Improvements</b>
** <b>Services</b>
*** Wireless: removed unnecessary information from system logs
** <b>System</b>
*** SSH: removed weak SSH algorithms
* <b>Fix</b>
** <b>System</b>
*** IP Block: fixed blocking of UDP traffic
*** Ledman: fixed WiFi LED indication when WiFi configuration is changed
* <b>CVE Patches</b>
** CVE-2024-31948
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.7.1/TAP200/TAP200_R_00.07.07.1_WEBUI.bin TAP200_R_00.07.07.1]</span></b> | 2024.05.03===
----
* <b>New</b>
** <b>Network</b>
*** Wireless: added mesh support
** <b>System</b>
*** WebUI: added the ability to generate random passwords for password input fields
*** WebUI: added reset to “Factory defaults” option
*** System: changed firmware certificate verification tool
*** IP Block: added time-based login attempt blocking
*** WebUI: added firmware update notification support
*** Logging: added multiple remote syslog servers support
* <b>Improvements</b>
** <b>Services</b>
*** WebUI: moved licenses to footer
** <b>System</b>
*** WebUI: adjusted responsive design breakpoints
*** WebUI: added more strict password requirements for restoring backup
*** WebUI: changed firmware update option to server as a default option
*** WebUI: improved first login password change logic
*** GPL: added offline package preparation command for GPL builds
*** Kernel: updated version to 5.10.210
*** Libcap: updated package version to 2.69
* <b>Fix</b>
** <b>System</b>
*** WebUI: fixed an issue when a user was not logged out after changing profiles
*** CLI: fixed enter key issue on mobile chromium based browsers
* <b>CVE Patches</b>
** CVE-2022-4603
** CVE-2022-23308
** CVE 2022-45061
** CVE-2023-0466
** CVE-2023-6129
** CVE-2023-7042
** CVE 2023-24329
** CVE 2023-27043
** CVE-2023-31083
** CVE-2023-42366
** CVE-2023-46218
** CVE-2023-46219
** CVE-2023-46752
** CVE-2023-46753
** CVE-2023-48795
** CVE-2024-2397
** CVE-2024-25062
** CVE-2024-27913
** CVE-2024-22365
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.10/TAP200/TAP200_R_00.07.06.10_WEBUI.bin TAP200_R_00.07.06.10]</span></b> | 2024.04.04===
* <b>Fix</b>
** <b>System</b>
*** Ledman: fixed memory leak
----
===<b>TAP200_R_00.07.06.8</b> | 2024.03.25===
* Firmware <b>R_00.07.06.8</b> was removed due to an issue with inefficient memory allocation for LED control.
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.6/TAP200/TAP200_R_00.07.06.6_WEBUI.bin TAP200_R_00.07.06.6]</span></b> | 2024.03.04===
* <b>New</b>
** <b>System</b>
*** Minified *.svg WebUI files to save space on the device
* <b>Fix</b>
** <b>Network</b>
*** Fixed the issue with Wireless bgscan functionality not operating correctly
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.5/TAP200/TAP200_R_00.07.06.5_WEBUI.bin TAP200_R_00.07.06.5]</span></b> | 2024.02.21===
* <b>Fix</b>
** <b>System</b>
*** Fixed year 2038 problem with time counter overflow
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.3/TAP200/TAP200_R_00.07.06.3_WEBUI.bin TAP200_R_00.07.06.3]</span></b> | 2024.01.17===
* <b>Fix</b>
** <b>System</b>
*** Patched CVE-2024-0193 vulnerability
*** Patched CVE-2023-51779 vulnerability
*** Updated OpenSSH to 9.6p1 version, fixed CVE-2023-51385 and CVE-2023-51384
*** Fixed profile migrations, added error handling when trying to change profile while it is still applying
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.1/TAP200/TAP200_R_00.07.06.1_WEBUI.bin TAP200_R_00.07.06.1]</span></b> | 2024.01.04===
* <b>Fix</b>
** <b>Services</b>
*** Fixed issue with NTPclient zombie processes
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6/TAP200/TAP200_R_00.07.06_WEBUI.bin TAP200_R_00.07.06]</span></b> | 2023.12.20===
* <b>New</b>
** <b>Network</b>
*** Added 802.11v BSS Transition Management and 802.11k Radio Resource Measurement
** <b>WebUI</b>
*** Renewed user interface design
*** Added network interface name change functionality
** <b>System</b>
*** API support
* <b>Improvements</b>
** <b>Network</b>
*** Added two radio support on one SSID in Wireless
** <b>WebUI</b>
*** Improved Events Log page loading by adding asynchronous pagination (pasikeitė puslapiavimo logika nei prieš tai buvusi)
*** Added auto redirect after changing router's IP address or port
*** Moved device menu entry “Reboot” to header menu
** <b>System</b>
*** Updated hostapd version to 2023-09-08
*** Updated mt76 package version to 2022-12-22
*** Updated kernel version to 5.4.259
*** Added RMS data display to generated troubleshoot
*** Added process activity load list to generated troubleshoot
* <b>Fix</b>
** <b>Network</b>
*** Fixed ethernet link not working with some 100 Mbit switches
*** Fixed concurrent Wireless STA and AP functionality on 5 GHz band
** <b>Services</b>
*** Added minimum free space check when saving logs to flash in Logging service
** <b>WebUI</b>
*** Fixed side menu style issues when Japanese language is used
*** Fixed displaying of vendor names in Topology page
*** Fixed language packs being selectable when still in Package Manager queue
*** Fixed realtime graphs responsive design issues
*** Fixed wireless realtime data to show signal as unavailable with no connected clients
*** Fixed setup wizard errors in Wireless configuration page
** <b>System</b>
*** Patched OpenSSL CVE-2023-3446
*** Patched OpenSSL CVE-2023-3817
*** Patched LibXML2 CVE-2023-39615
*** Patched LibXML2 CVE-2023-45322
*** Fixed running out of space when SSHFS is mounted in /tmp while generating troubleshoot
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.5.5/TAP200/TAP200_R_00.07.05.5_WEBUI.bin TAP200_R_00.07.05.5]</span></b> | 2023.11.13===
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.5.5/TAP200/TAP200_R_00.07.05.5_WEBUI.bin TAP200_R_00.07.05.5]</span></b> | 2023.11.13===
   
   

Latest revision as of 11:03, 6 November 2024

Main Page > TAP Access Points > TAP200 > TAP200 Firmware Downloads

This page contains firmware files for TAP200 devices. Look to the table below or the changelog to find download links.

To upgrade firmware using WebUI, follow the instructions in TAP200 Firmware.

TAP200

File Type Release date Size MD5 Changelog
TAP200_R_00.07.10.2_WEBUI.bin Latest FW 2024.11.04 10.75 MB f619fef121be5c841da2787cefe70eee Link
TAP200_R_00.07.09.4_WEBUI.bin Mass production FW 2024.10.02 9.94 MB acbe7464933cac2f175ca20fb0856c71 Link
TAP200_R_GPL_00.07.10.2.tar.gz SDK 2024.11.04 29.44 MB a061b082d1e91bcbd6ecb806c5db4c7b



FW checksums


Checksums for firmware files can be found here.

Changelog

TAP200_R_00.07.10.2 | 2024.11.04

  • Firmware includes no changes for this device

TAP200_R_00.07.10 | 2024.10.10

  • New
    • Services
      • RMS: added SOCKS5 proxy support
  • Improvements
    • Network
      • Curl: added unix socket support
      • Network: improved performance under stateless single-directional traffic (RFC2544)
      • Wireless: added interface status message when DFS CAC is in progress
    • System
      • Access Control: refactored 'General', 'Security' web pages
      • Auto Reboot: added support for multiple hosts/URLs in Ping/Wget Reboot
      • Backup: encrypting backup does not require 7zip package anymore
      • WebUI: added ability to open new page in new tab without entering user credentials
      • WebUI: improved SDK example application
      • Glib2: updated version to 2.80.5
      • Kernel: updated version to 5.10.224
      • Ncurses: updated version to 6.5
  • Fix
    • Network
      • Wireless: fixed showing incorrect transmit power
      • Wireless: fixed hostapd ubus call timeout after wireless configuration change
    • Services
      • Ledman: fixed issue when power LED turns off when rebooting device
    • System
      • CLI: fixed some private IPs being incorrectly determined as public
      • JSON-RPC: fixed login "Access Denied" error
      • WebUI: fixed 'Memory' status card progress bars visuals
      • WebUI: fixed search bar suggestions after removing packages
      • WebUI: fixed custom SDK pages not loading correctly
  • CVE Patches
    • CVE-2021-3520
    • CVE-2021-44540
    • CVE-2021-44541
    • CVE-2024-4032
    • CVE-2024-6119
    • CVE-2024-6232
    • CVE-2024-6923
    • CVE-2024-7264
    • CVE-2024-42225

TAP200_R_00.07.09.4 | 2024.10.02

  • Improvements
    • Services
      • NTP Client: changed default NTP servers
  • Fix
    • Services
      • NTP Client: fixed NTP server usage to work with next in line server if current server does not respond

TAP200_R_00.07.09.3 | 2024.09.27

  • Firmware includes no changes for this device

TAP200_R_00.07.09.1 | 2024.09.13

  • Improvements
    • Services
      • Python3: updated version to 3.11.7

TAP200_R_00.07.09 | 2024.09.03

  • New
    • Network
      • Wireless: added option to enable 802.11w Management frame protection when using non-WPA3 encryption
    • System
      • WebUI: added notifications menu
  • Improvements
    • Network
      • Wireless: increased EAP authentication logging
      • Wireless: added insecure configuration warnings when configuring SSIDs
      • Wireless: updated wireless cards to display each radio device's signal quality and band data
      • Wireless: reduced time required for Fast Transition in STA mode
    • System
      • Access Control: improved system user's access control rules logic
      • Access Control: added option to disable password auth for the root user
      • Backup: improved backup page by splitting it into backup and reset settings page
      • Update Firmware: changed firmware update log to include firmware version
      • WebUI: updated firmware and backup verification pages design
      • WebUI: improved global alerts display
      • WebUI: adjusted overview page layout design
      • Kernel: updated version to 5.10.221
  • Fix
    • Network
      • Wireless: fixed wireless status API response to contain separate interface information for multiple radio configurations
    • System
      • API Core: fixed file deletion
      • Troubleshoot: fixed troubleshoot not including all the log files when log to flash is enabled
      • User Settings: fixed page to show groups and users if the user has been granted access
      • WebUI: fixed overview page to display active wireless (WLAN) clients
  • CVE Patches
    • CVE-2021-32292
    • CVE-2022-40617
    • CVE-2023-49441
    • CVE-2024-0397
    • CVE-2024-3596
    • CVE-2024-5535
    • CVE-2024-8088
    • CVE-2024-26669
    • CVE-2024-26739
    • CVE-2024-26740
    • CVE-2024-36901

TAP200_R_00.07.08.2 | 2024.08.12

  • Fix
    • System
      • Update Firmware: fixed inconsistent firmware download from FOTA

TAP200_R_00.07.08.1 | 2024.08.06

Note: This firmware version was removed due to an issue with FOTA firmware download.

  • Fix
    • Network
      • Network: fixed default route not being added for PPPoE connections
    • System
      • WebUI: fixed SDK WebUI package compilation

TAP200_R_00.07.08 | 2024.07.18

Note: This firmware version was removed due to an issue with FOTA firmware download.

  • New
    • Network
      • 802.1X: added client support
    • Services
      • Wifi Scanner: added support
    • System
      • API Core: added option to configure api session timeout
      • UI Core: added data analytics support
      • Update Firmware: added warning message about device being temporarily unreachable on firmware update
  • Improvements
    • Network
      • Wireless: added warning when user configures mesh on radio with automatic frequency channel
      • Wireless: added support for wireless MAC-filter MAC ranges
      • Wireless: changed Radius Accounting port is not required when configuring access point with enterprise encryption
      • Wireless: enabled ACS(automatic channel selection) for 5 GHz radios by default
      • Wireless: refactored radio configuration page layout
      • Wireless: refactored assignment of wireless interfaces MAC addresses, STA interface will always use fixed address
    • Services
      • stunnel: updated version to 5.72
    • System
      • Access Control: added certificate key length warnings
      • Access Control: adjusted access control when all pages are blocked
      • Access Control: added certificate file download for CLI to work on all browsers
      • API Core: implemented functionality to include warning messages for vulnerable certificates
      • Boot: enabled HW watchdog in bootloader
      • RutOS: improved GPL example page to align with new software architecture
      • Troubleshoot: added support for multiple syslog servers
      • UI Core: added additional message with IP address to loading screen for scenarios when redirect to different IP address happens
      • UI Core: added toast message hiding when text is too long
      • Update Firmware: added 'Firmware version' data in screen after firmware upload
      • WebUI: added functionality to cancel loading screen if it takes 30 or more seconds
      • WebUI: removed all ubus method calls from webui
      • WebUI: added password generator for first login modal
      • WebUI: added sticky position to side menu
      • WebUI: added default password hint to login error message
      • WebUI: added warning messages for low-security certificates
      • Kernel: updated version to 5.10.217
      • libexpat: updated version to 2.6.2
      • SSL/TLS: updated version to 3.0.14
      • vue: updated version to 3.4
  • Fix
    • Network
      • Network: fixed overriding MAC address for interfaces that are bridged
      • Network: fixed missing default route when static mode is selected
      • Network: fixed tapxxx.rutos.net DNS resolution
      • Wireless: fixed wireless scan results sometimes not being returned
      • Wireless: fixed 5 GHz Wi-Fi scanning is prohibited when a DFS channel and ETSI regulatory domain is selected
      • Wireless: fixed Wi-Fi 5 GHz unsupported channel selection issue on specific widths
      • Wireless: fixed API POST validation without sending "mode" option
      • Wireless: removed the ability to have different countries in radio configurations
      • Wireless: fixed interface delete when it's unassigned from the wireless interface in access point mode
      • Wireless: fixed backticks for WiFi SSID are not allowed in WebUI
    • System
      • Access Control: fixed download certificate button to be visible
      • Administration: fixed repeated validation on cleared inputs and added validation when new password matches the old one
      • API Core: fixed API method validation during upload action
      • API Core: fixed error messages for POST method
      • API Core: fixed option list validation
      • Boot: fixed factory settings restore (firstboot) not deleting hidden files
      • Events Log: fixed refresh button in event log table
      • IP Block: fixed adding MAC addresses back to whitelist when unblocking all of them
      • System Status: fixed wireless MAC address display value if radio is disabled
      • Troubleshoot: fixed system log and kernel log buttons to be enabled with read only rights
      • Update Firmware: fixed misleading "Firmware version" status of "N/A" to "FOTA service is disabled" when FOTA is disabled
      • Update Firmware: fixed issue when infinite spinner appears after updating device firmware from server without having internet connection
  • CVE Patches
    • Patched CVE-2023-52425
    • Patched CVE-2023-52530
    • Patched CVE-2024-25629
    • Patched CVE-2024-28757

TAP200_R_00.07.07.3 | 2024.06.25

  • Fix
    • Network
      • WebUI: fixed port advertisement change
    • System
      • FOTA: fixed config when upgrading from older firmware with keep settings
  • CVE Patches
    • CVE-2024-31950
    • CVE-2024-31951

TAP200_R_00.07.07.2 | 2024.06.12

  • Improvements
    • Services
      • Wireless: removed unnecessary information from system logs
    • System
      • SSH: removed weak SSH algorithms
  • Fix
    • System
      • IP Block: fixed blocking of UDP traffic
      • Ledman: fixed WiFi LED indication when WiFi configuration is changed
  • CVE Patches
    • CVE-2024-31948

TAP200_R_00.07.07.1 | 2024.05.03


  • New
    • Network
      • Wireless: added mesh support
    • System
      • WebUI: added the ability to generate random passwords for password input fields
      • WebUI: added reset to “Factory defaults” option
      • System: changed firmware certificate verification tool
      • IP Block: added time-based login attempt blocking
      • WebUI: added firmware update notification support
      • Logging: added multiple remote syslog servers support
  • Improvements
    • Services
      • WebUI: moved licenses to footer
    • System
      • WebUI: adjusted responsive design breakpoints
      • WebUI: added more strict password requirements for restoring backup
      • WebUI: changed firmware update option to server as a default option
      • WebUI: improved first login password change logic
      • GPL: added offline package preparation command for GPL builds
      • Kernel: updated version to 5.10.210
      • Libcap: updated package version to 2.69
  • Fix
    • System
      • WebUI: fixed an issue when a user was not logged out after changing profiles
      • CLI: fixed enter key issue on mobile chromium based browsers
  • CVE Patches
    • CVE-2022-4603
    • CVE-2022-23308
    • CVE 2022-45061
    • CVE-2023-0466
    • CVE-2023-6129
    • CVE-2023-7042
    • CVE 2023-24329
    • CVE 2023-27043
    • CVE-2023-31083
    • CVE-2023-42366
    • CVE-2023-46218
    • CVE-2023-46219
    • CVE-2023-46752
    • CVE-2023-46753
    • CVE-2023-48795
    • CVE-2024-2397
    • CVE-2024-25062
    • CVE-2024-27913
    • CVE-2024-22365

TAP200_R_00.07.06.10 | 2024.04.04

  • Fix
    • System
      • Ledman: fixed memory leak

TAP200_R_00.07.06.8 | 2024.03.25

  • Firmware R_00.07.06.8 was removed due to an issue with inefficient memory allocation for LED control.

TAP200_R_00.07.06.6 | 2024.03.04

  • New
    • System
      • Minified *.svg WebUI files to save space on the device
  • Fix
    • Network
      • Fixed the issue with Wireless bgscan functionality not operating correctly

TAP200_R_00.07.06.5 | 2024.02.21

  • Fix
    • System
      • Fixed year 2038 problem with time counter overflow

TAP200_R_00.07.06.3 | 2024.01.17

  • Fix
    • System
      • Patched CVE-2024-0193 vulnerability
      • Patched CVE-2023-51779 vulnerability
      • Updated OpenSSH to 9.6p1 version, fixed CVE-2023-51385 and CVE-2023-51384
      • Fixed profile migrations, added error handling when trying to change profile while it is still applying

TAP200_R_00.07.06.1 | 2024.01.04

  • Fix
    • Services
      • Fixed issue with NTPclient zombie processes

TAP200_R_00.07.06 | 2023.12.20

  • New
    • Network
      • Added 802.11v BSS Transition Management and 802.11k Radio Resource Measurement
    • WebUI
      • Renewed user interface design
      • Added network interface name change functionality
    • System
      • API support
  • Improvements
    • Network
      • Added two radio support on one SSID in Wireless
    • WebUI
      • Improved Events Log page loading by adding asynchronous pagination (pasikeitė puslapiavimo logika nei prieš tai buvusi)
      • Added auto redirect after changing router's IP address or port
      • Moved device menu entry “Reboot” to header menu
    • System
      • Updated hostapd version to 2023-09-08
      • Updated mt76 package version to 2022-12-22
      • Updated kernel version to 5.4.259
      • Added RMS data display to generated troubleshoot
      • Added process activity load list to generated troubleshoot
  • Fix
    • Network
      • Fixed ethernet link not working with some 100 Mbit switches
      • Fixed concurrent Wireless STA and AP functionality on 5 GHz band
    • Services
      • Added minimum free space check when saving logs to flash in Logging service
    • WebUI
      • Fixed side menu style issues when Japanese language is used
      • Fixed displaying of vendor names in Topology page
      • Fixed language packs being selectable when still in Package Manager queue
      • Fixed realtime graphs responsive design issues
      • Fixed wireless realtime data to show signal as unavailable with no connected clients
      • Fixed setup wizard errors in Wireless configuration page
    • System
      • Patched OpenSSL CVE-2023-3446
      • Patched OpenSSL CVE-2023-3817
      • Patched LibXML2 CVE-2023-39615
      • Patched LibXML2 CVE-2023-45322
      • Fixed running out of space when SSHFS is mounted in /tmp while generating troubleshoot

TAP200_R_00.07.05.5 | 2023.11.13

  • Fixes
    • Network
      • Fixed ethernet link not working with some 100Mbit switches

TAP200_R_00.07.05.4 | 2023.11.09

  • Improvements
    • WebUI
      • Improved asynchronous pagination in events log pages
      • Optimized Overview page load
      • Added resource loading cancellation after switching to different page

TAP200_R_00.07.05.1 | 2023.10.26

  • New
    • Initial firmware release