TAP200 Firmware Downloads: Difference between revisions
Gytispieze (talk | contribs) No edit summary |
Gytispieze (talk | contribs) No edit summary |
||
(23 intermediate revisions by the same user not shown) | |||
Line 8: | Line 8: | ||
==Changelog== | ==Changelog== | ||
<!--NEW_FW--> | |||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.11/TAP200/TAP200_R_00.07.11_WEBUI.bin TAP200_R_00.07.11]</span></b> | 2024.11.25=== | |||
* <b>New</b> | |||
** <b>Network</b> | |||
*** Network: added fallback IP option to DHCP mode | |||
** <b>Services</b> | |||
*** Wireguard: added QR code configuration generator | |||
** <b>System</b> | |||
*** Administration: added capability of displaying a configurable banner before login | |||
*** Password Policy: added ability to modify the password policy | |||
*** System Users: added sensitive option toggle for user groups | |||
* <b>Improvements</b> | |||
** <b>Network</b> | |||
*** Wireless: changed radio status to show channel frequency in MHz instead of GHz | |||
** <b>System</b> | |||
*** Access Control: added ability to bind HTTP and HTTPS to specific IPs and ports | |||
*** Events Log: improved event log messages format | |||
*** Logging: added a log ID to each log entry for easier tracking and identification | |||
*** WebUI: updated design of tables | |||
*** Kernel: updated version to 5.10.226 | |||
*** libffi: updated version to 3.4.6 | |||
*** readline: updated version to 8.2 | |||
* <b>Fix</b> | |||
** <b>Network</b> | |||
*** Network: changed default mode to DHCP with fallback IP to prevent problems with incorrect subnet routing | |||
*** Wireless: fixed wireless not being reloaded after its interface's physical device was changed | |||
** <b>System</b> | |||
*** Access Control: fixed unauthorized errors on interface endpoints | |||
*** Access Control: fixed IP Block configuration when upgrading from previous firmware versions | |||
*** WebUI: fixed issue when sometimes hidden sections with created instances were not displayed | |||
* <b>CVE Patches</b> | |||
** CVE-2021-38291 | |||
** CVE-2024-6232 | |||
** CVE-2024-44070 | |||
---- | |||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.10.2/TAP200/TAP200_R_00.07.10.2_WEBUI.bin TAP200_R_00.07.10.2]</span></b> | 2024.11.04=== | |||
* Firmware includes no changes for this device | |||
---- | |||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.10/TAP200/TAP200_R_00.07.10_WEBUI.bin TAP200_R_00.07.10]</span></b> | 2024.10.10=== | |||
* <b>New</b> | |||
** <b>Services</b> | |||
*** RMS: added SOCKS5 proxy support | |||
* <b>Improvements</b> | |||
** <b>Network</b> | |||
*** Curl: added unix socket support | |||
*** Network: improved performance under stateless single-directional traffic (RFC2544) | |||
*** Wireless: added interface status message when DFS CAC is in progress | |||
** <b>System</b> | |||
*** Access Control: refactored 'General', 'Security' web pages | |||
*** Auto Reboot: added support for multiple hosts/URLs in Ping/Wget Reboot | |||
*** Backup: encrypting backup does not require 7zip package anymore | |||
*** WebUI: added ability to open new page in new tab without entering user credentials | |||
*** WebUI: improved SDK example application | |||
*** Glib2: updated version to 2.80.5 | |||
*** Kernel: updated version to 5.10.224 | |||
*** Ncurses: updated version to 6.5 | |||
* <b>Fix</b> | |||
** <b>Network</b> | |||
*** Wireless: fixed showing incorrect transmit power | |||
*** Wireless: fixed hostapd ubus call timeout after wireless configuration change | |||
** <b>Services</b> | |||
*** Ledman: fixed issue when power LED turns off when rebooting device | |||
** <b>System</b> | |||
*** CLI: fixed some private IPs being incorrectly determined as public | |||
*** JSON-RPC: fixed login "Access Denied" error | |||
*** WebUI: fixed 'Memory' status card progress bars visuals | |||
*** WebUI: fixed search bar suggestions after removing packages | |||
*** WebUI: fixed custom SDK pages not loading correctly | |||
* <b>CVE Patches</b> | |||
** CVE-2021-3520 | |||
** CVE-2021-44540 | |||
** CVE-2021-44541 | |||
** CVE-2024-4032 | |||
** CVE-2024-6119 | |||
** CVE-2024-6232 | |||
** CVE-2024-6923 | |||
** CVE-2024-7264 | |||
** CVE-2024-42225 | |||
---- | |||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.9.4/TAP200/TAP200_R_00.07.09.4_WEBUI.bin TAP200_R_00.07.09.4]</span></b> | 2024.10.02=== | |||
* <b>Improvements</b> | |||
** <b>Services</b> | |||
*** NTP Client: changed default NTP servers | |||
* <b>Fix</b> | |||
** <b>Services</b> | |||
*** NTP Client: fixed NTP server usage to work with next in line server if current server does not respond | |||
---- | |||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.9.3/TAP200/TAP200_R_00.07.09.3_WEBUI.bin TAP200_R_00.07.09.3]</span></b> | 2024.09.27=== | |||
* Firmware includes no changes for this device | |||
---- | |||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.9.1/TAP200/TAP200_R_00.07.09.1_WEBUI.bin TAP200_R_00.07.09.1]</span></b> | 2024.09.13=== | |||
* <b>Improvements</b> | |||
** <b>Services</b> | |||
*** Python3: updated version to 3.11.7 | |||
---- | |||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.9/TAP200/TAP200_R_00.07.09_WEBUI.bin TAP200_R_00.07.09]</span></b> | 2024.09.03=== | |||
* <b>New</b> | |||
** <b>Network</b> | |||
*** Wireless: added option to enable 802.11w Management frame protection when using non-WPA3 encryption | |||
** <b>System</b> | |||
*** WebUI: added notifications menu | |||
* <b>Improvements</b> | |||
** <b>Network</b> | |||
*** Wireless: increased EAP authentication logging | |||
*** Wireless: added insecure configuration warnings when configuring SSIDs | |||
*** Wireless: updated wireless cards to display each radio device's signal quality and band data | |||
*** Wireless: reduced time required for Fast Transition in STA mode | |||
** <b>System</b> | |||
*** Access Control: improved system user's access control rules logic | |||
*** Access Control: added option to disable password auth for the root user | |||
*** Backup: improved backup page by splitting it into backup and reset settings page | |||
*** Update Firmware: changed firmware update log to include firmware version | |||
*** WebUI: updated firmware and backup verification pages design | |||
*** WebUI: improved global alerts display | |||
*** WebUI: adjusted overview page layout design | |||
*** Kernel: updated version to 5.10.221 | |||
* <b>Fix</b> | |||
** <b>Network</b> | |||
*** Wireless: fixed wireless status API response to contain separate interface information for multiple radio configurations | |||
** <b>System</b> | |||
*** API Core: fixed file deletion | |||
*** Troubleshoot: fixed troubleshoot not including all the log files when log to flash is enabled | |||
*** User Settings: fixed page to show groups and users if the user has been granted access | |||
*** WebUI: fixed overview page to display active wireless (WLAN) clients | |||
* <b>CVE Patches</b> | |||
** CVE-2021-32292 | |||
** CVE-2022-40617 | |||
** CVE-2023-49441 | |||
** CVE-2024-0397 | |||
** CVE-2024-3596 | |||
** CVE-2024-5535 | |||
** CVE-2024-8088 | |||
** CVE-2024-26669 | |||
** CVE-2024-26739 | |||
** CVE-2024-26740 | |||
** CVE-2024-36901 | |||
---- | |||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.8.2/TAP200/TAP200_R_00.07.08.2_WEBUI.bin TAP200_R_00.07.08.2]</span></b> | 2024.08.12=== | |||
* <b>Fix</b> | |||
** <b>System</b> | |||
*** Update Firmware: fixed inconsistent firmware download from FOTA | |||
---- | |||
===<b>TAP200_R_00.07.08.1</b> | 2024.08.06=== | |||
<b>Note:</b> This firmware version was removed due to an issue with FOTA firmware download. | |||
* <b>Fix</b> | |||
** <b>Network</b> | |||
*** Network: fixed default route not being added for PPPoE connections | |||
** <b>System</b> | |||
*** WebUI: fixed SDK WebUI package compilation | |||
---- | |||
===<b>TAP200_R_00.07.08</b> | 2024.07.18=== | |||
<b>Note:</b> This firmware version was removed due to an issue with FOTA firmware download. | |||
* <b>New</b> | |||
** <b>Network</b> | |||
*** 802.1X: added client support | |||
** <b>Services</b> | |||
*** Wifi Scanner: added support | |||
** <b>System</b> | |||
*** API Core: added option to configure api session timeout | |||
*** UI Core: added data analytics support | |||
*** Update Firmware: added warning message about device being temporarily unreachable on firmware update | |||
* <b>Improvements</b> | |||
** <b>Network</b> | |||
*** Wireless: added warning when user configures mesh on radio with automatic frequency channel | |||
*** Wireless: added support for wireless MAC-filter MAC ranges | |||
*** Wireless: changed Radius Accounting port is not required when configuring access point with enterprise encryption | |||
*** Wireless: enabled ACS(automatic channel selection) for 5 GHz radios by default | |||
*** Wireless: refactored radio configuration page layout | |||
*** Wireless: refactored assignment of wireless interfaces MAC addresses, STA interface will always use fixed address | |||
** <b>Services</b> | |||
*** stunnel: updated version to 5.72 | |||
** <b>System</b> | |||
*** Access Control: added certificate key length warnings | |||
*** Access Control: adjusted access control when all pages are blocked | |||
*** Access Control: added certificate file download for CLI to work on all browsers | |||
*** API Core: implemented functionality to include warning messages for vulnerable certificates | |||
*** Boot: enabled HW watchdog in bootloader | |||
*** RutOS: improved GPL example page to align with new software architecture | |||
*** Troubleshoot: added support for multiple syslog servers | |||
*** UI Core: added additional message with IP address to loading screen for scenarios when redirect to different IP address happens | |||
*** UI Core: added toast message hiding when text is too long | |||
*** Update Firmware: added 'Firmware version' data in screen after firmware upload | |||
*** WebUI: added functionality to cancel loading screen if it takes 30 or more seconds | |||
*** WebUI: removed all ubus method calls from webui | |||
*** WebUI: added password generator for first login modal | |||
*** WebUI: added sticky position to side menu | |||
*** WebUI: added default password hint to login error message | |||
*** WebUI: added warning messages for low-security certificates | |||
*** Kernel: updated version to 5.10.217 | |||
*** libexpat: updated version to 2.6.2 | |||
*** SSL/TLS: updated version to 3.0.14 | |||
*** vue: updated version to 3.4 | |||
* <b>Fix</b> | |||
** <b>Network</b> | |||
*** Network: fixed overriding MAC address for interfaces that are bridged | |||
*** Network: fixed missing default route when static mode is selected | |||
*** Network: fixed tapxxx.rutos.net DNS resolution | |||
*** Wireless: fixed wireless scan results sometimes not being returned | |||
*** Wireless: fixed 5 GHz Wi-Fi scanning is prohibited when a DFS channel and ETSI regulatory domain is selected | |||
*** Wireless: fixed Wi-Fi 5 GHz unsupported channel selection issue on specific widths | |||
*** Wireless: fixed API POST validation without sending "mode" option | |||
*** Wireless: removed the ability to have different countries in radio configurations | |||
*** Wireless: fixed interface delete when it's unassigned from the wireless interface in access point mode | |||
*** Wireless: fixed backticks for WiFi SSID are not allowed in WebUI | |||
** <b>System</b> | |||
*** Access Control: fixed download certificate button to be visible | |||
*** Administration: fixed repeated validation on cleared inputs and added validation when new password matches the old one | |||
*** API Core: fixed API method validation during upload action | |||
*** API Core: fixed error messages for POST method | |||
*** API Core: fixed option list validation | |||
*** Boot: fixed factory settings restore (firstboot) not deleting hidden files | |||
*** Events Log: fixed refresh button in event log table | |||
*** IP Block: fixed adding MAC addresses back to whitelist when unblocking all of them | |||
*** System Status: fixed wireless MAC address display value if radio is disabled | |||
*** Troubleshoot: fixed system log and kernel log buttons to be enabled with read only rights | |||
*** Update Firmware: fixed misleading "Firmware version" status of "N/A" to "FOTA service is disabled" when FOTA is disabled | |||
*** Update Firmware: fixed issue when infinite spinner appears after updating device firmware from server without having internet connection | |||
* <b>CVE Patches</b> | |||
** Patched CVE-2023-52425 | |||
** Patched CVE-2023-52530 | |||
** Patched CVE-2024-25629 | |||
** Patched CVE-2024-28757 | |||
---- | |||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.7.3/TAP200/TAP200_R_00.07.07.3_WEBUI.bin TAP200_R_00.07.07.3]</span></b> | 2024.06.25=== | |||
* <b>Fix</b> | |||
** <b>Network</b> | |||
*** WebUI: fixed port advertisement change | |||
** <b>System</b> | |||
*** FOTA: fixed config when upgrading from older firmware with keep settings | |||
* <b>CVE Patches</b> | |||
** CVE-2024-31950 | |||
** CVE-2024-31951 | |||
---- | |||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.7.2/TAP200/TAP200_R_00.07.07.2_WEBUI.bin TAP200_R_00.07.07.2]</span></b> | 2024.06.12=== | |||
* <b>Improvements</b> | |||
** <b>Services</b> | |||
*** Wireless: removed unnecessary information from system logs | |||
** <b>System</b> | |||
*** SSH: removed weak SSH algorithms | |||
* <b>Fix</b> | |||
** <b>System</b> | |||
*** IP Block: fixed blocking of UDP traffic | |||
*** Ledman: fixed WiFi LED indication when WiFi configuration is changed | |||
* <b>CVE Patches</b> | |||
** CVE-2024-31948 | |||
---- | |||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.7.1/TAP200/TAP200_R_00.07.07.1_WEBUI.bin TAP200_R_00.07.07.1]</span></b> | 2024.05.03=== | |||
---- | |||
* <b>New</b> | |||
** <b>Network</b> | |||
*** Wireless: added mesh support | |||
** <b>System</b> | |||
*** WebUI: added the ability to generate random passwords for password input fields | |||
*** WebUI: added reset to “Factory defaults” option | |||
*** System: changed firmware certificate verification tool | |||
*** IP Block: added time-based login attempt blocking | |||
*** WebUI: added firmware update notification support | |||
*** Logging: added multiple remote syslog servers support | |||
* <b>Improvements</b> | |||
** <b>Services</b> | |||
*** WebUI: moved licenses to footer | |||
** <b>System</b> | |||
*** WebUI: adjusted responsive design breakpoints | |||
*** WebUI: added more strict password requirements for restoring backup | |||
*** WebUI: changed firmware update option to server as a default option | |||
*** WebUI: improved first login password change logic | |||
*** GPL: added offline package preparation command for GPL builds | |||
*** Kernel: updated version to 5.10.210 | |||
*** Libcap: updated package version to 2.69 | |||
* <b>Fix</b> | |||
** <b>System</b> | |||
*** WebUI: fixed an issue when a user was not logged out after changing profiles | |||
*** CLI: fixed enter key issue on mobile chromium based browsers | |||
* <b>CVE Patches</b> | |||
** CVE-2022-4603 | |||
** CVE-2022-23308 | |||
** CVE 2022-45061 | |||
** CVE-2023-0466 | |||
** CVE-2023-6129 | |||
** CVE-2023-7042 | |||
** CVE 2023-24329 | |||
** CVE 2023-27043 | |||
** CVE-2023-31083 | |||
** CVE-2023-42366 | |||
** CVE-2023-46218 | |||
** CVE-2023-46219 | |||
** CVE-2023-46752 | |||
** CVE-2023-46753 | |||
** CVE-2023-48795 | |||
** CVE-2024-2397 | |||
** CVE-2024-25062 | |||
** CVE-2024-27913 | |||
** CVE-2024-22365 | |||
---- | |||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.10/TAP200/TAP200_R_00.07.06.10_WEBUI.bin TAP200_R_00.07.06.10]</span></b> | 2024.04.04=== | |||
* <b>Fix</b> | |||
** <b>System</b> | |||
*** Ledman: fixed memory leak | |||
---- | |||
===<b>TAP200_R_00.07.06.8</b> | 2024.03.25=== | |||
* Firmware <b>R_00.07.06.8</b> was removed due to an issue with inefficient memory allocation for LED control. | |||
---- | ---- | ||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.6/TAP200/TAP200_R_00.07.06.6_WEBUI.bin TAP200_R_00.07.06.6]</span></b> | 2024.03.04=== | ===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.6/TAP200/TAP200_R_00.07.06.6_WEBUI.bin TAP200_R_00.07.06.6]</span></b> | 2024.03.04=== | ||
* <b>New</b> | |||
** <b>System</b> | |||
*** Minified *.svg WebUI files to save space on the device | |||
* <b>Fix</b> | |||
** <b>Network</b> | |||
*** Fixed the issue with Wireless bgscan functionality not operating correctly | |||
---- | ---- | ||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.5/TAP200/TAP200_R_00.07.06.5_WEBUI.bin TAP200_R_00.07.06.5]</span></b> | 2024.02.21=== | ===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.5/TAP200/TAP200_R_00.07.06.5_WEBUI.bin TAP200_R_00.07.06.5]</span></b> | 2024.02.21=== | ||
* <b>Fix</b> | |||
** <b>System</b> | |||
*** Fixed year 2038 problem with time counter overflow | |||
---- | ---- | ||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.3/TAP200/TAP200_R_00.07.06.3_WEBUI.bin TAP200_R_00.07.06.3]</span></b> | 2024.01.17=== | ===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.3/TAP200/TAP200_R_00.07.06.3_WEBUI.bin TAP200_R_00.07.06.3]</span></b> | 2024.01.17=== | ||
* <b>Fix</b> | |||
** <b>System</b> | |||
*** Patched CVE-2024-0193 vulnerability | |||
*** Patched CVE-2023-51779 vulnerability | |||
*** Updated OpenSSH to 9.6p1 version, fixed CVE-2023-51385 and CVE-2023-51384 | |||
*** Fixed profile migrations, added error handling when trying to change profile while it is still applying | |||
---- | ---- | ||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.1/TAP200/TAP200_R_00.07.06.1_WEBUI.bin TAP200_R_00.07.06.1]</span></b> | 2024.01.04=== | ===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.1/TAP200/TAP200_R_00.07.06.1_WEBUI.bin TAP200_R_00.07.06.1]</span></b> | 2024.01.04=== | ||
* <b>Fix</b> | * <b>Fix</b> | ||
** <b>Services</b> | ** <b>Services</b> | ||
*** Fixed issue with NTPclient zombie processes | *** Fixed issue with NTPclient zombie processes | ||
---- | |||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6/TAP200/TAP200_R_00.07.06_WEBUI.bin TAP200_R_00.07.06]</span></b> | 2023.12.20=== | ===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6/TAP200/TAP200_R_00.07.06_WEBUI.bin TAP200_R_00.07.06]</span></b> | 2023.12.20=== | ||
Latest revision as of 16:30, 25 November 2024
Main Page > TAP Access Points > TAP200 > TAP200 Firmware DownloadsThis page contains firmware files for TAP200 devices. Look to the table below or the changelog to find download links.
To upgrade firmware using WebUI, follow the instructions in TAP200 Firmware.
TAP200
File | Type | Release date | Size | MD5 | Changelog |
---|---|---|---|---|---|
TAP200_R_00.07.11_WEBUI.bin | Latest FW | 2024.11.25 | 10.94 MB | c8a7d4e88dd36eb82adb32abf84a0cb7 | Link |
TAP200_R_00.07.09.4_WEBUI.bin | Mass production FW | 2024.10.02 | 9.94 MB | acbe7464933cac2f175ca20fb0856c71 | Link |
TAP200_R_GPL_00.07.11.tar.gz | SDK | 2024.11.25 | 29.75 MB | 5fc645e62c2df3c22e8a447633b66e7e |
FW checksums
Checksums for firmware files can be found here.
Changelog
TAP200_R_00.07.11 | 2024.11.25
- New
- Network
- Network: added fallback IP option to DHCP mode
- Services
- Wireguard: added QR code configuration generator
- System
- Administration: added capability of displaying a configurable banner before login
- Password Policy: added ability to modify the password policy
- System Users: added sensitive option toggle for user groups
- Network
- Improvements
- Network
- Wireless: changed radio status to show channel frequency in MHz instead of GHz
- System
- Access Control: added ability to bind HTTP and HTTPS to specific IPs and ports
- Events Log: improved event log messages format
- Logging: added a log ID to each log entry for easier tracking and identification
- WebUI: updated design of tables
- Kernel: updated version to 5.10.226
- libffi: updated version to 3.4.6
- readline: updated version to 8.2
- Network
- Fix
- Network
- Network: changed default mode to DHCP with fallback IP to prevent problems with incorrect subnet routing
- Wireless: fixed wireless not being reloaded after its interface's physical device was changed
- System
- Access Control: fixed unauthorized errors on interface endpoints
- Access Control: fixed IP Block configuration when upgrading from previous firmware versions
- WebUI: fixed issue when sometimes hidden sections with created instances were not displayed
- Network
- CVE Patches
- CVE-2021-38291
- CVE-2024-6232
- CVE-2024-44070
TAP200_R_00.07.10.2 | 2024.11.04
- Firmware includes no changes for this device
TAP200_R_00.07.10 | 2024.10.10
- New
- Services
- RMS: added SOCKS5 proxy support
- Services
- Improvements
- Network
- Curl: added unix socket support
- Network: improved performance under stateless single-directional traffic (RFC2544)
- Wireless: added interface status message when DFS CAC is in progress
- System
- Access Control: refactored 'General', 'Security' web pages
- Auto Reboot: added support for multiple hosts/URLs in Ping/Wget Reboot
- Backup: encrypting backup does not require 7zip package anymore
- WebUI: added ability to open new page in new tab without entering user credentials
- WebUI: improved SDK example application
- Glib2: updated version to 2.80.5
- Kernel: updated version to 5.10.224
- Ncurses: updated version to 6.5
- Network
- Fix
- Network
- Wireless: fixed showing incorrect transmit power
- Wireless: fixed hostapd ubus call timeout after wireless configuration change
- Services
- Ledman: fixed issue when power LED turns off when rebooting device
- System
- CLI: fixed some private IPs being incorrectly determined as public
- JSON-RPC: fixed login "Access Denied" error
- WebUI: fixed 'Memory' status card progress bars visuals
- WebUI: fixed search bar suggestions after removing packages
- WebUI: fixed custom SDK pages not loading correctly
- Network
- CVE Patches
- CVE-2021-3520
- CVE-2021-44540
- CVE-2021-44541
- CVE-2024-4032
- CVE-2024-6119
- CVE-2024-6232
- CVE-2024-6923
- CVE-2024-7264
- CVE-2024-42225
TAP200_R_00.07.09.4 | 2024.10.02
- Improvements
- Services
- NTP Client: changed default NTP servers
- Services
- Fix
- Services
- NTP Client: fixed NTP server usage to work with next in line server if current server does not respond
- Services
TAP200_R_00.07.09.3 | 2024.09.27
- Firmware includes no changes for this device
TAP200_R_00.07.09.1 | 2024.09.13
- Improvements
- Services
- Python3: updated version to 3.11.7
- Services
TAP200_R_00.07.09 | 2024.09.03
- New
- Network
- Wireless: added option to enable 802.11w Management frame protection when using non-WPA3 encryption
- System
- WebUI: added notifications menu
- Network
- Improvements
- Network
- Wireless: increased EAP authentication logging
- Wireless: added insecure configuration warnings when configuring SSIDs
- Wireless: updated wireless cards to display each radio device's signal quality and band data
- Wireless: reduced time required for Fast Transition in STA mode
- System
- Access Control: improved system user's access control rules logic
- Access Control: added option to disable password auth for the root user
- Backup: improved backup page by splitting it into backup and reset settings page
- Update Firmware: changed firmware update log to include firmware version
- WebUI: updated firmware and backup verification pages design
- WebUI: improved global alerts display
- WebUI: adjusted overview page layout design
- Kernel: updated version to 5.10.221
- Network
- Fix
- Network
- Wireless: fixed wireless status API response to contain separate interface information for multiple radio configurations
- System
- API Core: fixed file deletion
- Troubleshoot: fixed troubleshoot not including all the log files when log to flash is enabled
- User Settings: fixed page to show groups and users if the user has been granted access
- WebUI: fixed overview page to display active wireless (WLAN) clients
- Network
- CVE Patches
- CVE-2021-32292
- CVE-2022-40617
- CVE-2023-49441
- CVE-2024-0397
- CVE-2024-3596
- CVE-2024-5535
- CVE-2024-8088
- CVE-2024-26669
- CVE-2024-26739
- CVE-2024-26740
- CVE-2024-36901
TAP200_R_00.07.08.2 | 2024.08.12
- Fix
- System
- Update Firmware: fixed inconsistent firmware download from FOTA
- System
TAP200_R_00.07.08.1 | 2024.08.06
Note: This firmware version was removed due to an issue with FOTA firmware download.
- Fix
- Network
- Network: fixed default route not being added for PPPoE connections
- System
- WebUI: fixed SDK WebUI package compilation
- Network
TAP200_R_00.07.08 | 2024.07.18
Note: This firmware version was removed due to an issue with FOTA firmware download.
- New
- Network
- 802.1X: added client support
- Services
- Wifi Scanner: added support
- System
- API Core: added option to configure api session timeout
- UI Core: added data analytics support
- Update Firmware: added warning message about device being temporarily unreachable on firmware update
- Network
- Improvements
- Network
- Wireless: added warning when user configures mesh on radio with automatic frequency channel
- Wireless: added support for wireless MAC-filter MAC ranges
- Wireless: changed Radius Accounting port is not required when configuring access point with enterprise encryption
- Wireless: enabled ACS(automatic channel selection) for 5 GHz radios by default
- Wireless: refactored radio configuration page layout
- Wireless: refactored assignment of wireless interfaces MAC addresses, STA interface will always use fixed address
- Services
- stunnel: updated version to 5.72
- System
- Access Control: added certificate key length warnings
- Access Control: adjusted access control when all pages are blocked
- Access Control: added certificate file download for CLI to work on all browsers
- API Core: implemented functionality to include warning messages for vulnerable certificates
- Boot: enabled HW watchdog in bootloader
- RutOS: improved GPL example page to align with new software architecture
- Troubleshoot: added support for multiple syslog servers
- UI Core: added additional message with IP address to loading screen for scenarios when redirect to different IP address happens
- UI Core: added toast message hiding when text is too long
- Update Firmware: added 'Firmware version' data in screen after firmware upload
- WebUI: added functionality to cancel loading screen if it takes 30 or more seconds
- WebUI: removed all ubus method calls from webui
- WebUI: added password generator for first login modal
- WebUI: added sticky position to side menu
- WebUI: added default password hint to login error message
- WebUI: added warning messages for low-security certificates
- Kernel: updated version to 5.10.217
- libexpat: updated version to 2.6.2
- SSL/TLS: updated version to 3.0.14
- vue: updated version to 3.4
- Network
- Fix
- Network
- Network: fixed overriding MAC address for interfaces that are bridged
- Network: fixed missing default route when static mode is selected
- Network: fixed tapxxx.rutos.net DNS resolution
- Wireless: fixed wireless scan results sometimes not being returned
- Wireless: fixed 5 GHz Wi-Fi scanning is prohibited when a DFS channel and ETSI regulatory domain is selected
- Wireless: fixed Wi-Fi 5 GHz unsupported channel selection issue on specific widths
- Wireless: fixed API POST validation without sending "mode" option
- Wireless: removed the ability to have different countries in radio configurations
- Wireless: fixed interface delete when it's unassigned from the wireless interface in access point mode
- Wireless: fixed backticks for WiFi SSID are not allowed in WebUI
- System
- Access Control: fixed download certificate button to be visible
- Administration: fixed repeated validation on cleared inputs and added validation when new password matches the old one
- API Core: fixed API method validation during upload action
- API Core: fixed error messages for POST method
- API Core: fixed option list validation
- Boot: fixed factory settings restore (firstboot) not deleting hidden files
- Events Log: fixed refresh button in event log table
- IP Block: fixed adding MAC addresses back to whitelist when unblocking all of them
- System Status: fixed wireless MAC address display value if radio is disabled
- Troubleshoot: fixed system log and kernel log buttons to be enabled with read only rights
- Update Firmware: fixed misleading "Firmware version" status of "N/A" to "FOTA service is disabled" when FOTA is disabled
- Update Firmware: fixed issue when infinite spinner appears after updating device firmware from server without having internet connection
- Network
- CVE Patches
- Patched CVE-2023-52425
- Patched CVE-2023-52530
- Patched CVE-2024-25629
- Patched CVE-2024-28757
TAP200_R_00.07.07.3 | 2024.06.25
- Fix
- Network
- WebUI: fixed port advertisement change
- System
- FOTA: fixed config when upgrading from older firmware with keep settings
- Network
- CVE Patches
- CVE-2024-31950
- CVE-2024-31951
TAP200_R_00.07.07.2 | 2024.06.12
- Improvements
- Services
- Wireless: removed unnecessary information from system logs
- System
- SSH: removed weak SSH algorithms
- Services
- Fix
- System
- IP Block: fixed blocking of UDP traffic
- Ledman: fixed WiFi LED indication when WiFi configuration is changed
- System
- CVE Patches
- CVE-2024-31948
TAP200_R_00.07.07.1 | 2024.05.03
- New
- Network
- Wireless: added mesh support
- System
- WebUI: added the ability to generate random passwords for password input fields
- WebUI: added reset to “Factory defaults” option
- System: changed firmware certificate verification tool
- IP Block: added time-based login attempt blocking
- WebUI: added firmware update notification support
- Logging: added multiple remote syslog servers support
- Network
- Improvements
- Services
- WebUI: moved licenses to footer
- System
- WebUI: adjusted responsive design breakpoints
- WebUI: added more strict password requirements for restoring backup
- WebUI: changed firmware update option to server as a default option
- WebUI: improved first login password change logic
- GPL: added offline package preparation command for GPL builds
- Kernel: updated version to 5.10.210
- Libcap: updated package version to 2.69
- Services
- Fix
- System
- WebUI: fixed an issue when a user was not logged out after changing profiles
- CLI: fixed enter key issue on mobile chromium based browsers
- System
- CVE Patches
- CVE-2022-4603
- CVE-2022-23308
- CVE 2022-45061
- CVE-2023-0466
- CVE-2023-6129
- CVE-2023-7042
- CVE 2023-24329
- CVE 2023-27043
- CVE-2023-31083
- CVE-2023-42366
- CVE-2023-46218
- CVE-2023-46219
- CVE-2023-46752
- CVE-2023-46753
- CVE-2023-48795
- CVE-2024-2397
- CVE-2024-25062
- CVE-2024-27913
- CVE-2024-22365
TAP200_R_00.07.06.10 | 2024.04.04
- Fix
- System
- Ledman: fixed memory leak
- System
TAP200_R_00.07.06.8 | 2024.03.25
- Firmware R_00.07.06.8 was removed due to an issue with inefficient memory allocation for LED control.
TAP200_R_00.07.06.6 | 2024.03.04
- New
- System
- Minified *.svg WebUI files to save space on the device
- System
- Fix
- Network
- Fixed the issue with Wireless bgscan functionality not operating correctly
- Network
TAP200_R_00.07.06.5 | 2024.02.21
- Fix
- System
- Fixed year 2038 problem with time counter overflow
- System
TAP200_R_00.07.06.3 | 2024.01.17
- Fix
- System
- Patched CVE-2024-0193 vulnerability
- Patched CVE-2023-51779 vulnerability
- Updated OpenSSH to 9.6p1 version, fixed CVE-2023-51385 and CVE-2023-51384
- Fixed profile migrations, added error handling when trying to change profile while it is still applying
- System
TAP200_R_00.07.06.1 | 2024.01.04
- Fix
- Services
- Fixed issue with NTPclient zombie processes
- Services
TAP200_R_00.07.06 | 2023.12.20
- New
- Network
- Added 802.11v BSS Transition Management and 802.11k Radio Resource Measurement
- WebUI
- Renewed user interface design
- Added network interface name change functionality
- System
- API support
- Network
- Improvements
- Network
- Added two radio support on one SSID in Wireless
- WebUI
- Improved Events Log page loading by adding asynchronous pagination (pasikeitė puslapiavimo logika nei prieš tai buvusi)
- Added auto redirect after changing router's IP address or port
- Moved device menu entry “Reboot” to header menu
- System
- Updated hostapd version to 2023-09-08
- Updated mt76 package version to 2022-12-22
- Updated kernel version to 5.4.259
- Added RMS data display to generated troubleshoot
- Added process activity load list to generated troubleshoot
- Network
- Fix
- Network
- Fixed ethernet link not working with some 100 Mbit switches
- Fixed concurrent Wireless STA and AP functionality on 5 GHz band
- Services
- Added minimum free space check when saving logs to flash in Logging service
- WebUI
- Fixed side menu style issues when Japanese language is used
- Fixed displaying of vendor names in Topology page
- Fixed language packs being selectable when still in Package Manager queue
- Fixed realtime graphs responsive design issues
- Fixed wireless realtime data to show signal as unavailable with no connected clients
- Fixed setup wizard errors in Wireless configuration page
- System
- Patched OpenSSL CVE-2023-3446
- Patched OpenSSL CVE-2023-3817
- Patched LibXML2 CVE-2023-39615
- Patched LibXML2 CVE-2023-45322
- Fixed running out of space when SSHFS is mounted in /tmp while generating troubleshoot
- Network
TAP200_R_00.07.05.5 | 2023.11.13
- Fixes
- Network
- Fixed ethernet link not working with some 100Mbit switches
- Network
TAP200_R_00.07.05.4 | 2023.11.09
- Improvements
- WebUI
- Improved asynchronous pagination in events log pages
- Optimized Overview page load
- Added resource loading cancellation after switching to different page
- WebUI
TAP200_R_00.07.05.1 | 2023.10.26
- New
- Initial firmware release