Jump to content

TAP100 Firmware Downloads: Difference between revisions

No edit summary
No edit summary
 
(76 intermediate revisions by 2 users not shown)
Line 8: Line 8:


==Changelog==
==Changelog==
{{Template:Global_changelog_disclaimer}}
<!--NEW_FW-->
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.19.4/TAP100/TAP100_R_00.07.19.4_WEBUI.bin TAP100_R_00.07.19.4]</span></b> | 2025.12.05===
* Firmware includes no changes for this device
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.19.2/TAP100/TAP100_R_00.07.19.2_WEBUI.bin TAP100_R_00.07.19.2]</span></b> | 2025.11.26===
* <b>Fix</b>
** <b>System</b>
*** Update Firmware: fixed firmware download cancellation
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.19.1/TAP100/TAP100_R_00.07.19.1_WEBUI.bin TAP100_R_00.07.19.1]</span></b> | 2025.11.12===
* <b>Fix</b>
** <b>System</b>
*** WebUI: fixed unresponsive navigation after password change
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.19/TAP100/TAP100_R_00.07.19_WEBUI.bin TAP100_R_00.07.19]</span></b> | 2025.11.06===
* <b>Improvements</b>
** <b>Network</b>
*** Network: improved DHCP client and server related fields
** <b>Services</b>
*** cURL: updated version to 8.16.0
** <b>System</b>
*** Custom Scripts: added page loading spinner
*** Update Firmware: improved FOTA communication and caching logic
*** WebUI: improved usability on small screens
*** Kernel: updated version to 5.15.193
* <b>Fix</b>
** <b>Network</b>
*** Wireless: fixed invalid mesh interface encryption data reporting
*** Wireless: fixed excessive Wi-Fi service log file creation due to service restarts
*** Wireless: fixed "Allow legacy 802.11b rates" option not working properly
*** Wireless: fixed an error preventing mesh interface deletion
*** Wireless: fixed missing background scan data in learn mode
** <b>Services</b>
*** MQTT Broker: fixed TLSv1.1 configuration
** <b>System</b>
*** Access Control: fixed displaying certificates in "HTTPS" edit modal after page refresh
*** Administration: fixed incorrect creation date of user's default configuration
*** API Core: fixed API error on 'DELETE' request with bad payload structure
*** Events Log: fixed sorting reset functionality of table columns and "Event group" column issues
*** WebUI: fixed "visible columns" button to be clickable for users without "write" permissions
*** WebUI: removed bell notifications from modals
*** WebUI: fixed length validation for custom input values in select lists
*** WebUI: fixed active state of filters on tables
* <b>CVE Patches</b>
** CVE-2025-4373 - 4.8 (MEDIUM)
** CVE-2025-6020 - 7.8 (HIGH)
** CVE-2025-6052 - 7.5 (HIGH)
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.18.3/TAP100/TAP100_R_00.07.18.3_WEBUI.bin TAP100_R_00.07.18.3]</span></b> | 2025.10.30===
* <b>Improvements</b>
** <b>System</b>
*** ubus: updated version to 2025-10-19
* <b>Fix</b>
** <b>System</b>
*** Backup: fixed issues uploading older backup files
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.18.2/TAP100/TAP100_R_00.07.18.2_WEBUI.bin TAP100_R_00.07.18.2]</span></b> | 2025.10.22===
* Firmware includes no changes for this device
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.18.1/TAP100/TAP100_R_00.07.18.1_WEBUI.bin TAP100_R_00.07.18.1]</span></b> | 2025.10.13===
* Firmware includes no changes for this device
----
===<b>TAP100_R_00.07.18</b> | 2025.10.01===
<b>Note:</b> This firmware version has been withdrawn due to an issue with incorrect mobile operator selection under specific conditions.
* <b>Improvements</b>
** <b>Network</b>
*** Dnsmasq: updated version to 2.90
*** Iperf3: updated version to 3.19.1
** <b>System</b>
*** Access Control: added JSON-RPC enable toggle
*** WebUI: added indicators when a form input inside an inactive tab was changed or invalid
*** WebUI: added "Skip to main content" accessibility feature
*** WebUI: improved multi select design
*** WebUI: improved styles of drag hint on smaller screens
*** WebUI: improved consistent formatting across all hints
* <b>Fix</b>
** <b>Services</b>
*** RMS: fixed RMS authentication under poor internet conditions
** <b>System</b>
*** Administration: fixed "User group" input validation
*** API Core: fixed double quoted boundary parsing
*** Kernel: fixed compilation of 'fs-cifs' kernel module package
*** Profiles: fixed endpoint response when calling from internal API
*** UI Core: fixed 'Save & Apply' button reachability on mobile devices
*** Update Firmware: fixed incorrect FOTA address in SDK
*** WebUI: fixed text-area width issues on small screen devices
* <b>CVE Patches</b>
** CVE-2025-6021
** CVE-2025-32415
** CVE-2025-49794
** CVE-2025-49796
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.17.5/TAP100/TAP100_R_00.07.17.5_WEBUI.bin TAP100_R_00.07.17.5]</span></b> | 2025.09.30===
* Firmware includes no changes for this device
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.17.4/TAP100/TAP100_R_00.07.17.4_WEBUI.bin TAP100_R_00.07.17.4]</span></b> | 2025.09.17===
* <b>Fix</b>
** <b>System</b>
*** Profiles: fixed keep-settings execution for older profiles
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.17.3/TAP100/TAP100_R_00.07.17.3_WEBUI.bin TAP100_R_00.07.17.3]</span></b> | 2025.09.05===
* Firmware includes no changes for this device
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.17.2/TAP100/TAP100_R_00.07.17.2_WEBUI.bin TAP100_R_00.07.17.2]</span></b> | 2025.09.02===
* <b>Improvements</b>
** <b>Network</b>
*** iwinfo: updated version to 2025-02-06
* <b>Fix</b>
** <b>System</b>
*** Backup: fixed keep-settings execution for older backups
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.17.1/TAP100/TAP100_R_00.07.17.1_WEBUI.bin TAP100_R_00.07.17.1]</span></b> | 2025.08.19===
* Firmware includes no changes for this device
----
===<b>TAP100_R_00.07.17</b> | 2025.08.12===
<b>Note:</b> This firmware was removed due an issue with Failover functionality.
* <b>New</b>
** <b>System</b>
*** RutOS: added instructions for creating a simple package using the SDK
* <b>Improvements</b>
** <b>Network</b>
*** hostapd: updated version to 2025-05-23
** <b>Services</b>
*** Package Manager: added confirmation modal when removing multiple packages
** <b>System</b>
*** Administration: added notifications and alerts display toggles
*** Administration: updated certificates page
*** UI Core: changed all chart styles
*** WebUI: updated brand color palette
*** WebUI: added sensitive information hiding feature for 'IMSI', 'ICCID' and 'IP address' fields for lower privilege users
*** WebUI: added truncation and hover tooltips for long side widget card titles
*** WebUI: unified the "Change Password" page title
*** Kernel: updated version to 5.15.186
* <b>Fix</b>
** <b>Network</b>
*** Wireless: fixed default cipher not being returned from the API
*** Wireless: fixed an API error that occurred when joining a mesh network while a client network was present
*** Wireless: fixed wireless radio page loading incorrectly when user has limited permissions
** <b>System</b>
*** Access Control: fixed duplicate query parameter validation
*** Access Control: fixed HTTP WAN remote switch is shown as disabled after the "WAN to LAN" action
*** Administration: fixed device usage duplicate query parameter validation
*** Administration: fixed issue of "delete" button not being disabled on "System users" page when user has no write permissions
*** Events Log: fixed duplicate query parameter validation
*** Profiles: fixed issue that allowed deletion of profiles in use by the scheduler
*** WebUI: fixed notifications disappearing on page navigation
*** WebUI: fixed validation for fields using "url" rule
* <b>CVE Patches</b>
** CVE-2023-53154
** CVE-2024-31578
** CVE-2024-52533
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.16.6/TAP100/TAP100_R_00.07.16.6_WEBUI.bin TAP100_R_00.07.16.6]</span></b> | 2025.09.17===
* <b>Fix</b>
** <b>System</b>
*** Profiles: fixed keep-settings execution for older profiles
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.16.3/TAP100/TAP100_R_00.07.16.3_WEBUI.bin TAP100_R_00.07.16.3]</span></b> | 2025.07.28===
* Firmware includes no changes for this device
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.16.2/TAP100/TAP100_R_00.07.16.2_WEBUI.bin TAP100_R_00.07.16.2]</span></b> | 2025.07.24===
* Firmware includes no changes for this device
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.16.1/TAP100/TAP100_R_00.07.16.1_WEBUI.bin TAP100_R_00.07.16.1]</span></b> | 2025.07.17===
* <b>Improvements</b>
** <b>Network</b>
*** Wireless: improved FT roaming performance in STA mode
** <b>System</b>
*** WebUI: updated icon sizes
*** WebUI: added long hold to drag on mobile for draggable cards
*** WebUI: improved layout and functionality of log modals
*** WebUI: added information about 'Branch' to 'System' page
*** dropbear: updated version to 2025.88
*** Kernel: updated version to 5.15.184
*** tpm2-openssl: updated version to 1.3.0
* <b>Fix</b>
** <b>Network</b>
*** Network: fixed incorrect IP address netmask validation
*** Wireless: fixed LAN network interface being removed after related WiFi interface is deleted
*** Wireless: fixed noise value calculation
*** Wireless: fixed incorrect CSA handling in STA+AP mode
** <b>Services</b>
*** Wifi Scanner: fixed some wireless interfaces not getting added or removed from scanning list
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.15.4/TAP100/TAP100_R_00.07.15.4_WEBUI.bin TAP100_R_00.07.15.4]</span></b> | 2025.07.11===
* <b>Fix</b>
** <b>System</b>
*** Backup: fixed internal firmware metadata not updating after applying backup
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.15.2/TAP100/TAP100_R_00.07.15.2_WEBUI.bin TAP100_R_00.07.15.2]</span></b> | 2025.06.27===
* <b>Improvements</b>
** <b>System</b>
*** Update Firmware: optimized firmware validation through caching
* <b>Fix</b>
** <b>Network</b>
*** Wireless: fixed WPA3-SAE fast transition configuration
** <b>System</b>
*** System Status: fixed display of MAC address
*** WebUI: fixed subscribe processes not exiting when UHTTPD is killed
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.15.1/TAP100/TAP100_R_00.07.15.1_WEBUI.bin TAP100_R_00.07.15.1]</span></b> | 2025.06.17===
* <b>Fix</b>
** <b>System</b>
*** Backup: fixed missing root and admin user restoration during backup apply
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.15/TAP100/TAP100_R_00.07.15_WEBUI.bin TAP100_R_00.07.15]</span></b> | 2025.06.06===
* <b>New</b>
** <b>System</b>
*** WebUI: added default HTTP redirect to HTTPS
* <b>Improvements</b>
** <b>Network</b>
*** Wireless: simplified radio transmit power selection
*** Wireless: added status for current radio transmit power
** <b>Services</b>
*** ovpn-dco: updated version to 0.2.20241216
** <b>System</b>
*** API Core: added preflight OPTIONS method support
*** Troubleshoot: separated troubleshooting into individual configuration tabs
*** Troubleshoot: improved logging size configuration and log size limits
*** WebUI: reduced size of the navigation menu and some form elements
*** WebUI: updated table selected rows actions design
*** WebUI: added HTTPS certificate expiration warning and renew functionality
*** WebUI: unified styles of first login and renew expired password modals
*** WebUI: updated Japanese translations
*** Kernel: updated version to 5.15
* <b>Fix</b>
** <b>Network</b>
*** 802.1X Client: fixed warning message of different port configurations sometimes appearing when closing modal
*** 802.1X Client: fixed 802.1X (client) page access not being controlled by the "Network > Ports" entry
*** Network: fixed incorrect network type shown for LAN with only WiFi interface
*** Wireless: fixed trailing whitespace being ignored in SSID or password
*** Wireless: fixed enterprise client configuration not showing all certificates and keys generated with SCEP
*** Wireless: fixed enterprise client configuration requiring password for unencrypted certificate key
** <b>Services</b>
*** RMS: fixed 'Next connection after' timer display
*** RMS: fixed transition from 'Standby' to 'Enabled' mode
** <b>System</b>
*** Access Control: fixed HTTPS certificates validation to not allow RSA key length less than 1024 bits and ECC key length less than 160 bits
*** API Core: fixed session validation issues
*** System Status: removed bootloader version information if it does not exist
*** WebUI: fixed inconsistent spacing between page elements
*** WebUI: fixed warnings still being displayed after removing uploaded certificates
*** WebUI: fixed issues with SDK API path recognition
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.14.3/TAP100/TAP100_R_00.07.14.3_WEBUI.bin TAP100_R_00.07.14.3]</span></b> | 2025.05.26===
* <b>Fix</b>
** <b>System</b>
*** Custom Scripts: fixed execution of custom scripts after upgrade
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.14.2/TAP100/TAP100_R_00.07.14.2_WEBUI.bin TAP100_R_00.07.14.2]</span></b> | 2025.05.09===
<b>Note:</b> If a system upgrade with keep settings is performed from <b>R_00.07.14</b> or <b>R_00.07.14.1</b> to this version, follow the instructions described under those firmware versions below to resolve Data Limit and traffic monitoring issues.
 
----
* <b>Fix</b>
** <b>Network</b>
*** Network: fixed data limit database save when upgrading with keep settings
*** Network: fixed Management VLAN input
*** Wireless: fixed VLAN ID input
----
===<b>TAP100_R_00.07.14.1</b> | 2025.05.06===
<b>Note:</b> This firmware version has been withdrawn due to an issue affecting the Data Limit, traffic monitoring functionalities.
 
<b>Note:</b> If a system upgrade with keep settings was already performed from <b>R_00.07.14</b> to this version, previous Data Limit tracking and traffic monitoring information cannot be restored. However, to keep current traffic monitoring history after next update, the command found in the <b>Note</b> below must be executed in CLI.
 
<b>Note:</b> If a system upgrade with keep settings is performed from this firmware version to newer and <b>R_00.07.14</b> was never used, following command must be executed in CLI <b>before</b> upgrade to resolve Data Limit and traffic monitoring issues.
<pre>mkdir -p /usr/local/lib/upgrade/keep.d && echo /usr/local/usr/lib/mdcollectd/mdcollectd.db_new.gz > /usr/local/lib/upgrade/keep.d/mdcollect</pre>
----
* <b>Fix</b>
** <b>System</b>
*** RutOS: fixed curl compilation in SDK
* <b>CVE Patches</b>
** CVE-2025-2704
----
===<b>TAP100_R_00.07.14</b> | 2025.04.24===
<b>Note:</b> This firmware version has been withdrawn due to an issue affecting the Data Limit, traffic monitoring functionalities.
 
<b>Note:</b> If a system upgrade with keep settings is performed from this firmware version to newer, following command must be executed in CLI <b>before</b> upgrade to resolve Data Limit and traffic monitoring issues.
<pre>mkdir -p /usr/local/lib/upgrade/keep.d && echo /usr/local/usr/lib/mdcollectd/mdcollectd.db_new.gz > /usr/local/lib/upgrade/keep.d/mdcollect</pre>
----
* <b>New</b>
** <b>System</b>
*** RutOS: enabled a read-only root filesystem to ensure system integrity and security
* <b>Improvements</b>
** <b>Network</b>
*** Wireless: added warning to a radio channel option when client is configured on same radio indicating that this option can be ignored
*** Wireless: added WiFi standard used by the connected client
*** Curl: updated version to 8.12.0
*** wireless-regdb: updated version to 2024.10.07
** <b>System</b>
*** Events Log: added events log file export
*** Profiles: improved table data UI
*** WebUI: removed default password icons on "Internet Explorer" and "Microsoft Edge" browsers
*** Kernel: updated version to 5.15.178
*** Time Zone Database: updated version to 2025a
* <b>Fix</b>
** <b>Network</b>
*** Wireless: fixed hover hint always being shown on delete button
** <b>Services</b>
*** RMS: fixed serial code copy button not being displayed
** <b>System</b>
*** API Core: fixed file upload issue which sometimes made WebUI unresponsive
*** NTP: fixed time servers limit validation
*** Password Policy: fixed special characters validation
*** Profiles: fixed loading screen reappearing after profile change fails
*** WebUI: fixed enabled button being removed in some cards on medium sized screens
* <b>CVE Patches</b>
** CVE-2022-42721
** CVE-2023-7104
** CVE-2023-31489
** CVE-2024-9143
** CVE-2024-13176
----
 
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.13.4/TAP100/TAP100_R_00.07.13.4_WEBUI.bin TAP100_R_00.07.13.4]</span></b> | 2025.04.04===
* <b>Improvements</b>
** <b>System</b>
*** RutOS: updated libubox
* <b>Fix</b>
** <b>System</b>
*** RutOS: fixed occasional ubus page fault after package install
*** RutOS: fixed user group duplicate entries after applying backup
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.13.3/TAP100/TAP100_R_00.07.13.3_WEBUI.bin TAP100_R_00.07.13.3]</span></b> | 2025.03.21===
* <b>Fix</b>
** <b>Services</b>
*** RMS: fixed connection retry interval count
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.13.2/TAP100/TAP100_R_00.07.13.2_WEBUI.bin TAP100_R_00.07.13.2]</span></b> | 2025.03.18===
* <b>Fix</b>
** <b>Network</b>
*** 802.1X Client: fixed 802.1x client not working when upgrading from an older firmware
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.13.1/TAP100/TAP100_R_00.07.13.1_WEBUI.bin TAP100_R_00.07.13.1]</span></b> | 2025.03.06===
* <b>Fix</b>
** <b>System</b>
*** Auto Reboot: fixed an issue causing the device to reboot immediately
----
===<b>TAP100_R_00.07.13</b> | 2025.03.03===
<b>Note:</b> This firmware was removed due an issue with Auto Reboot functionality performing unnecessary device reboot.
* <b>New</b>
** <b>System</b>
*** Update Firmware: added link to FW & SDK download page
* <b>Improvements</b>
** <b>Network</b>
*** Wireless: added rotating log files for wireless services
*** iperf3: updated version to 3.17.1
** <b>System</b>
*** Access Control: improved UX when disabling HTTP and HTTPS local access settings
*** Administration: added confirmation prompt when changing profiles
*** Administration: updated hostname validation to allow numeric-only hostname
*** Security: changed password policy to require at least one special character
*** Update Firmware: added link to changelog page
*** WebUI: removed basic/advanced mode
*** WebUI: updated Teltonika logo
*** Kernel: updated version to 5.15.176
* <b>Fix</b>
** <b>Network</b>
*** Network: fixed ethernet switch port state change tracking logic
*** Network: fixed API failing to sort specific network interface configurations
*** Network: fixed VLAN management hijacking the wireless network under certain conditions
*** Network: fixed forwarding DNS queries through wrong VLAN
*** Wireless: fixed new network edit not opening after network with same name deleted
*** Wireless: fixed automatic channel selection failing in Japan regulatory domain
*** Wireless: fixed memory leak in wireless service caused by AP configuration reloads
*** Wireless: fixed inaccurate Hotspot error when saving SSIDs page
** <b>Services</b>
*** RMS: fixed the "Connection state" status displayed as JSON when device language was set to anything other than English
** <b>System</b>
*** Access Control: fixed "redirect_https" option reset after device reboot
*** Access Control: fixed default HTTPS CA certificate generation
*** Date & Time: fixed time synchronization with the browser when using Europe/Kyiv timezone
*** Update Firmware: fixed unnecessary FOTA requests when FOTA is disabled
* <b>CVE Patches</b>
** CVE-2022-49043
** CVE-2024-5290
** CVE-2024-9287
** CVE-2024-11053
** CVE-2024-34459
** CVE-2024-53580
** CVE-2024-56171
** CVE-2025-24928
** CVE-2025-27113
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.12.3/TAP100/TAP100_R_00.07.12.3_WEBUI.bin TAP100_R_00.07.12.3]</span></b> | 2025.02.14===
* Firmware includes no changes for this device
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.12/TAP100/TAP100_R_00.07.12_WEBUI.bin TAP100_R_00.07.12]</span></b> | 2025.01.20===
* <b>Improvements</b>
** <b>Network</b>
*** Wireless: sorted scan results by signal strength by default
*** Wireless: renamed password field in join modal to be called same as in edit modal
*** Curl: updated version to 8.11.0
** <b>System</b>
*** API Core: added query parameter for configuration GET endpoints to receive all options, even if unset
*** Kernel: updated version to 5.15.171
* <b>Fix</b>
** <b>Network</b>
*** Wireless: fixed displayed client status when WPA supplicant does not have status
*** Wireless: fixed transmit power getting adjusted incorrectly when changing regulatory country
*** Wireless: fixed API "htmode" option format validation
*** Wireless: fixed API allowing empty "country" value
*** Wireless: fixed incorrect TX power calculation
** <b>Services</b>
*** NTP Client: fixed Count of time synchronizations that was not working properly
*** Wifi Scanner: fixed service not working when initially Wireless radio is disabled
** <b>System</b>
*** WebUI: fixed SDK example app validation mismatch between UI and API
* <b>CVE Patches</b>
** CVE-2024-5594
** CVE-2024-9681
** CVE-2024-29195
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.11.3/TAP100/TAP100_R_00.07.11.3_WEBUI.bin TAP100_R_00.07.11.3]</span></b> | 2024.12.17===
* <b>Fix</b>
** <b>Services</b>
* Firmware includes no changes for this device
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.11.2/TAP100/TAP100_R_00.07.11.2_WEBUI.bin TAP100_R_00.07.11.2]</span></b> | 2024.12.09===
* Firmware includes no changes for this device
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.11.1/TAP100/TAP100_R_00.07.11.1_WEBUI.bin TAP100_R_00.07.11.1]</span></b> | 2024.12.02===
* <b>Fix</b>
** <b>Services</b>
*** Ledman: fixed issue when network type LEDs are blinking when data connection is established
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.11/TAP100/TAP100_R_00.07.11_WEBUI.bin TAP100_R_00.07.11]</span></b> | 2024.11.25===
* <b>New</b>
** <b>Network</b>
*** Network: added fallback IP option to DHCP mode
** <b>Services</b>
*** Wireguard: added QR code configuration generator
** <b>System</b>
*** Administration: added capability of displaying a configurable banner before login
*** Password Policy: added ability to modify the password policy
*** System Users: added sensitive option toggle for user groups
* <b>Improvements</b>
** <b>Network</b>
*** Wireless: changed radio status to show channel frequency in MHz instead of GHz
** <b>System</b>
*** Access Control: added ability to bind HTTP and HTTPS to specific IPs and ports
*** Events Log: improved event log messages format
*** Logging: added a log ID to each log entry for easier tracking and identification
*** WebUI: updated design of tables
*** Kernel: updated version to 5.15.167
*** libffi: updated version to 3.4.6
*** readline: updated version to 8.2
* <b>Fix</b>
** <b>Network</b>
*** Network: changed default mode to DHCP with fallback IP to prevent problems with incorrect subnet routing
*** Wireless: fixed wireless not being reloaded after its interface's physical device was changed
** <b>System</b>
*** Access Control: fixed unauthorized errors on interface endpoints
*** Access Control: fixed IP Block configuration when upgrading from previous firmware versions
*** WebUI: fixed issue when sometimes hidden sections with created instances were not displayed
* <b>CVE Patches</b>
** CVE-2021-38291
** CVE-2024-6232
** CVE-2024-44070
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.10.2/TAP100/TAP100_R_00.07.10.2_WEBUI.bin TAP100_R_00.07.10.2]</span></b> | 2024.11.04===
* Firmware includes no changes for this device
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.10/TAP100/TAP100_R_00.07.10_WEBUI.bin TAP100_R_00.07.10]</span></b> | 2024.10.10===
* <b>New</b>
** <b>Network</b>
*** Wireless: added noise value calculation
** <b>Services</b>
*** RMS: added SOCKS5 proxy support
* <b>Improvements</b>
** <b>Network</b>
*** Curl: added unix socket support
*** Network: improved performance under stateless single-directional traffic (RFC2544)
*** Wireless: added interface status message when DFS CAC is in progress
** <b>System</b>
*** Access Control: refactored 'General', 'Security' web pages
*** Auto Reboot: added support for multiple hosts/URLs in Ping/Wget Reboot
*** Backup: encrypting backup does not require 7zip package anymore
*** WebUI: added ability to open new page in new tab without entering user credentials
*** WebUI: improved SDK example application
*** Glib2: updated version to 2.80.5
*** Ncurses: updated version to 6.5
* <b>Fix</b>
** <b>Network</b>
*** Wireless: fixed BSSID show for interface in Client mode
*** Wireless: fixed hostapd ubus call timeout after wireless configuration change
** <b>Services</b>
*** Ledman: fixed issue when power LED turns off when rebooting device
** <b>System</b>
*** CLI: fixed some private IPs being incorrectly determined as public
*** JSON-RPC: fixed login "Access Denied" error
*** WebUI: fixed 'Memory' status card progress bars visuals
*** WebUI: fixed search bar suggestions after removing packages
*** WebUI: fixed custom SDK pages not loading correctly
* <b>CVE Patches</b>
** CVE-2021-3520
** CVE-2021-44540
** CVE-2021-44541
** CVE-2024-4032
** CVE-2024-6119
** CVE-2024-6232
** CVE-2024-6923
** CVE-2024-7264
** CVE-2024-42225
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.9.4/TAP100/TAP100_R_00.07.09.4_WEBUI.bin TAP100_R_00.07.09.4]</span></b> | 2024.10.02===
* <b>Improvements</b>
** <b>Services</b>
*** NTP Client: changed default NTP servers
* <b>Fix</b>
** <b>Services</b>
*** NTP Client: fixed NTP server usage to work with next in line server if current server does not respond
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.9.3/TAP100/TAP100_R_00.07.09.3_WEBUI.bin TAP100_R_00.07.09.3]</span></b> | 2024.09.27===
* Firmware includes no changes for this device
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.9.1/TAP100/TAP100_R_00.07.09.1_WEBUI.bin TAP100_R_00.07.09.1]</span></b> | 2024.09.13===
* <b>Improvements</b>
** <b>Services</b>
*** Python3: updated version to 3.11.7
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.9/TAP100/TAP100_R_00.07.09_WEBUI.bin TAP100_R_00.07.09]</span></b> | 2024.09.03===
* <b>New</b>
** <b>Network</b>
*** Wireless: added option to enable 802.11w Management frame protection when using non-WPA3 encryption
** <b>System</b>
*** WebUI: added notifications menu
* <b>Improvements</b>
** <b>Network</b>
*** Wireless: increased EAP authentication logging
*** Wireless: added insecure configuration warnings when configuring SSIDs
*** Wireless: updated wireless cards to display each radio device's signal quality and band data
*** Wireless: reduced time required for Fast Transition in STA mode
** <b>System</b>
*** Access Control: improved system user's access control rules logic
*** Access Control: added option to disable password auth for the root user
*** Backup: improved backup page by splitting it into backup and reset settings page
*** Update Firmware: changed firmware update log to include firmware version
*** WebUI: updated firmware and backup verification pages design
*** WebUI: improved global alerts display
*** WebUI: adjusted overview page layout design
*** Kernel: updated version to 5.15.162
* <b>Fix</b>
** <b>Network</b>
*** Network: fixed Ethernet switch port state change tracking logic
*** Wireless: fixed wireless status API response to contain separate interface information for multiple radio configurations
** <b>System</b>
*** API Core: fixed file deletion
*** Boot: fixed Teltonika logo in httpd recovery page when using Firefox
*** Troubleshoot: fixed troubleshoot not including all the log files when log to flash is enabled
*** User Settings: fixed page to show groups and users if the user has been granted access
*** WebUI: fixed overview page to display active wireless (WLAN) clients
* <b>CVE Patches</b>
** CVE-2021-32292
** CVE-2022-40617
** CVE-2023-49441
** CVE-2024-0397
** CVE-2024-3596
** CVE-2024-5535
** CVE-2024-8088
** CVE-2024-26669
** CVE-2024-26739
** CVE-2024-26740
** CVE-2024-36901
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.8.2/TAP100/TAP100_R_00.07.08.2_WEBUI.bin TAP100_R_00.07.08.2]</span></b> | 2024.08.12===
* <b>Fix</b>
** <b>System</b>
*** Update Firmware: fixed inconsistent firmware download from FOTA
----
===<b>TAP100_R_00.07.08.1</b> | 2024.08.06===
<b>Note:</b> This firmware version was removed due to an issue with FOTA firmware download.
* <b>Fix</b>
** <b>Network</b>
*** Network: fixed default route not being added for PPPoE connections
** <b>System</b>
*** WebUI: fixed SDK WebUI package compilation
 
----
===<b>TAP100_R_00.07.08</b> | 2024.07.18===
<b>Note:</b> This firmware version was removed due to an issue with FOTA firmware download.
* <b>New</b>
** <b>Network</b>
*** 802.1X: added client support
** <b>Services</b>
*** Wifi Scanner: added support
** <b>System</b>
*** API Core: added option to configure api session timeout
*** UI Core: added data analytics support
*** Update Firmware: added warning message about device being temporarily unreachable on firmware update
* <b>Improvements</b>
** <b>Network</b>
*** Wireless: added warning when user configures mesh on radio with automatic frequency channel
*** Wireless: added support for wireless MAC-filter MAC ranges
*** Wireless: changed Radius Accounting port is not required when configuring access point with enterprise encryption
*** Wireless: refactored radio configuration page layout
*** Wireless: refactored assignment of wireless interfaces MAC addresses, STA interface will always use fixed address
** <b>Services</b>
*** stunnel: updated version to 5.72
** <b>System</b>
*** Access Control: added certificate key length warnings
*** Access Control: adjusted access control when all pages are blocked
*** Access Control: added certificate file download for CLI to work on all browsers
*** API Core: implemented functionality to include warning messages for vulnerable certificates
*** RutOS: improved GPL example page to align with new software architecture
*** Troubleshoot: added support for multiple syslog servers
*** UI Core: added additional message with IP address to loading screen for scenarios when redirect to different IP address happens
*** UI Core: added toast message hiding when text is too long
*** Update Firmware: added 'Firmware version' data in screen after firmware upload
*** WebUI: added functionality to cancel loading screen if it takes 30 or more seconds
*** WebUI: removed all ubus method calls from webui
*** WebUI: added password generator for first login modal
*** WebUI: added sticky position to side menu
*** WebUI: added default password hint to login error message
*** WebUI: added warning messages for low-security certificates
*** Kernel: updated version to 5.15.159
*** libexpat: updated version to 2.6.2
*** SSL/TLS: updated version to 3.0.14
*** vue: updated version to 3.4
* <b>Fix</b>
** <b>Network</b>
*** Network: fixed overriding MAC address for interfaces that are bridged
*** Network: fixed missing default route when static mode is selected
*** Network: fixed tapxxx.rutos.net DNS resolution
*** Wireless: fixed wireless scan results sometimes not being returned
*** Wireless: fixed API POST validation without sending "mode" option
*** Wireless: removed the ability to have different countries in radio configurations
*** Wireless: fixed interface delete when it's unassigned from the wireless interface in access point mode
*** Wireless: fixed backticks for WiFi SSID are not allowed in WebUI
** <b>System</b>
*** Access Control: fixed download certificate button to be visible
*** Administration: fixed repeated validation on cleared inputs and added validation when new password matches the old one
*** API Core: fixed API method validation during upload action
*** API Core: fixed error messages for POST method
*** API Core: fixed option list validation
*** Boot: fixed factory settings restore (firstboot) not deleting hidden files
*** Events Log: fixed refresh button in event log table
*** IP Block: fixed adding MAC addresses back to whitelist when unblocking all of them
*** System Status: fixed wireless MAC address display value if radio is disabled
*** Troubleshoot: fixed system log and kernel log buttons to be enabled with read only rights
*** Update Firmware: fixed misleading "Firmware version" status of "N/A" to "FOTA service is disabled" when FOTA is disabled
*** Update Firmware: fixed issue when infinite spinner appears after updating device firmware from server without having internet connection
* <b>CVE Patches</b>
** Patched CVE-2023-52425
** Patched CVE-2023-52530
** Patched CVE-2024-25629
** Patched CVE-2024-28757
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.7.3/TAP100/TAP100_R_00.07.07.3_WEBUI.bin TAP100_R_00.07.07.3]</span></b> | 2024.06.25===
* <b>Fix</b>
** <b>Network</b>
*** WebUI: fixed port advertisement change
** <b>System</b>
*** FOTA: fixed config when upgrading from older firmware with keep settings
* <b>CVE Patches</b>
** CVE-2024-31950
** CVE-2024-31951
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.7.2/TAP100/TAP100_R_00.07.07.2_WEBUI.bin TAP100_R_00.07.07.2]</span></b> | 2024.06.12===
* <b>Improvements</b>
** <b>Services</b>
*** Wireless: removed unnecessary information from system logs
** <b>System</b>
*** SSH: removed weak SSH algorithms
* <b>Fix</b>
** <b>System</b>
*** IP Block: fixed blocking of UDP traffic
*** Ledman: fixed WiFi LED indication when WiFi configuration is changed
*** Uboot: fixed firmware recovery update via uboot on Windows
* <b>CVE Patches</b>
** CVE-2024-31948
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.7.1/TAP100/TAP100_R_00.07.07.1_WEBUI.bin TAP100_R_00.07.07.1]</span></b> | 2024.05.03===
* <b>New</b>
** <b>System</b>
*** WebUI: added the ability to generate random passwords for password input fields
*** WebUI: added reset to “Factory defaults” option
*** System: changed firmware certificate verification tool
*** IP Block: added time-based login attempt blocking
*** WebUI: added firmware update notification support
*** Logging: added multiple remote syslog servers support
* <b>Improvements</b>
** <b>Services</b>
*** WebUI: moved licenses to footer
** <b>System</b>
*** WebUI: adjusted responsive design breakpoints
*** WebUI: added more strict password requirements for restoring backup
*** WebUI: changed firmware update option to server as a default option
*** WebUI: improved first login password change logic
*** GPL: added offline package preparation command for GPL builds
*** Kernel: updated to version 5.15.149
*** Libcap: updated package version to 2.69
* <b>Fix</b>
** <b>System</b>
*** WebUI: fixed an issue when a user was not logged out after changing profiles
*** CLI: fixed enter key issue on mobile chromium based browsers
* <b>CVE Patches</b>
** CVE-2022-4603
** CVE-2022-23308
** CVE 2022-45061
** CVE-2023-0466
** CVE-2023-6129
** CVE-2023-7042
** CVE 2023-24329
** CVE 2023-27043
** CVE-2023-42366
** CVE-2023-46218
** CVE-2023-46219
** CVE-2023-46752
** CVE-2023-46753
** CVE-2023-48795
** CVE-2024-2397
** CVE-2024-25062
** CVE-2024-27913
** CVE-2024-22365
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.10/TAP100/TAP100_R_00.07.06.10_WEBUI.bin TAP100_R_00.07.06.10]</span></b> | 2024.04.04===
* <b>Fix</b>
** <b>System</b>
*** Ledman: fixed memory leak
----
===<b>TAP100_R_00.07.06.8</b> | 2024.03.25===
----
* Firmware <b>R_00.07.06.8</b> was removed due to an issue with inefficient memory allocation for LED control.
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.6/TAP100/TAP100_R_00.07.06.6_WEBUI.bin TAP100_R_00.07.06.6]</span></b> | 2024.03.04===
* <b>New</b>
** <b>System</b>
*** Minified *.svg WebUI files to save space on the device
* <b>Fix</b>
** <b>Network</b>
*** Fixed the issue with Wireless bgscan functionality not operating correctly
----
----
<!--NEW_FW-->
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.5/TAP100/TAP100_R_00.07.06.5_WEBUI.bin TAP100_R_00.07.06.5]</span></b> | 2024.02.21===
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.5/TAP100/TAP100_R_00.07.06.5_WEBUI.bin TAP100_R_00.07.06.5]</span></b> | 2024.02.21===
* <b>Fix</b>
** <b>System</b>
*** Fixed year 2038 problem with time counter overflow
----
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.3/TAP100/TAP100_R_00.07.06.3_WEBUI.bin TAP100_R_00.07.06.3]</span></b> | 2024.01.17===
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.3/TAP100/TAP100_R_00.07.06.3_WEBUI.bin TAP100_R_00.07.06.3]</span></b> | 2024.01.17===
* <b>Fix</b>
** <b>System</b>
*** Patched CVE-2024-0193 vulnerability
*** Patched CVE-2023-51779 vulnerability
*** Updated OpenSSH to 9.6p1 version, fixed CVE-2023-51385 and CVE-2023-51384
*** Fixed profile migrations, added error handling when trying to change profile while it is still applying
----
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.1/TAP100/TAP100_R_00.07.06.1_WEBUI.bin TAP100_R_00.07.06.1]</span></b> | 2024.01.04===
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.1/TAP100/TAP100_R_00.07.06.1_WEBUI.bin TAP100_R_00.07.06.1]</span></b> | 2024.01.04===
* <b>Fix</b>
* <b>Fix</b>
** <b>Services</b>
** <b>Services</b>
*** Fixed issue with NTPclient zombie processes
*** Fixed issue with NTPclient zombie processes
 
----
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6/TAP100/TAP100_R_00.07.06_WEBUI.bin TAP100_R_00.07.06]</span></b> | 2023.12.20===
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6/TAP100/TAP100_R_00.07.06_WEBUI.bin TAP100_R_00.07.06]</span></b> | 2023.12.20===
   
   
Line 130: Line 866:
*** Patched CVE-2023-29469 vulnerability
*** Patched CVE-2023-29469 vulnerability
*** Patched CVE-2023-31490 vulnerability
*** Patched CVE-2023-31490 vulnerability
*** Patched CVE-2023-36369 vulnerability
*** Patched CVE-2021-36369 vulnerability
*** Patched CVE-2023-48174 vulnerability
*** Patched CVE-2023-48174 vulnerability
*** Fixed Events Log database rotation to prevent log partition space exhaustion
*** Fixed Events Log database rotation to prevent log partition space exhaustion