TAP100 Firmware Downloads: Difference between revisions
Gytispieze (talk | contribs) No edit summary |
Gytispieze (talk | contribs) No edit summary |
||
(14 intermediate revisions by the same user not shown) | |||
Line 9: | Line 9: | ||
==Changelog== | ==Changelog== | ||
<!--NEW_FW--> | <!--NEW_FW--> | ||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.10.2/TAP100/TAP100_R_00.07.10.2_WEBUI.bin TAP100_R_00.07.10.2]</span></b> | 2024.11.04=== | |||
* Firmware includes no changes for this device | |||
---- | |||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.10/TAP100/TAP100_R_00.07.10_WEBUI.bin TAP100_R_00.07.10]</span></b> | 2024.10.10=== | |||
* <b>New</b> | |||
** <b>Network</b> | |||
*** Wireless: added noise value calculation | |||
** <b>Services</b> | |||
*** RMS: added SOCKS5 proxy support | |||
* <b>Improvements</b> | |||
** <b>Network</b> | |||
*** Curl: added unix socket support | |||
*** Network: improved performance under stateless single-directional traffic (RFC2544) | |||
*** Wireless: added interface status message when DFS CAC is in progress | |||
** <b>System</b> | |||
*** Access Control: refactored 'General', 'Security' web pages | |||
*** Auto Reboot: added support for multiple hosts/URLs in Ping/Wget Reboot | |||
*** Backup: encrypting backup does not require 7zip package anymore | |||
*** WebUI: added ability to open new page in new tab without entering user credentials | |||
*** WebUI: improved SDK example application | |||
*** Glib2: updated version to 2.80.5 | |||
*** Ncurses: updated version to 6.5 | |||
* <b>Fix</b> | |||
** <b>Network</b> | |||
*** Wireless: fixed BSSID show for interface in Client mode | |||
*** Wireless: fixed hostapd ubus call timeout after wireless configuration change | |||
** <b>Services</b> | |||
*** Ledman: fixed issue when power LED turns off when rebooting device | |||
** <b>System</b> | |||
*** CLI: fixed some private IPs being incorrectly determined as public | |||
*** JSON-RPC: fixed login "Access Denied" error | |||
*** WebUI: fixed 'Memory' status card progress bars visuals | |||
*** WebUI: fixed search bar suggestions after removing packages | |||
*** WebUI: fixed custom SDK pages not loading correctly | |||
* <b>CVE Patches</b> | |||
** CVE-2021-3520 | |||
** CVE-2021-44540 | |||
** CVE-2021-44541 | |||
** CVE-2024-4032 | |||
** CVE-2024-6119 | |||
** CVE-2024-6232 | |||
** CVE-2024-6923 | |||
** CVE-2024-7264 | |||
** CVE-2024-42225 | |||
---- | |||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.9.4/TAP100/TAP100_R_00.07.09.4_WEBUI.bin TAP100_R_00.07.09.4]</span></b> | 2024.10.02=== | |||
* <b>Improvements</b> | |||
** <b>Services</b> | |||
*** NTP Client: changed default NTP servers | |||
* <b>Fix</b> | |||
** <b>Services</b> | |||
*** NTP Client: fixed NTP server usage to work with next in line server if current server does not respond | |||
---- | |||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.9.3/TAP100/TAP100_R_00.07.09.3_WEBUI.bin TAP100_R_00.07.09.3]</span></b> | 2024.09.27=== | |||
* Firmware includes no changes for this device | |||
---- | |||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.9.1/TAP100/TAP100_R_00.07.09.1_WEBUI.bin TAP100_R_00.07.09.1]</span></b> | 2024.09.13=== | |||
* <b>Improvements</b> | |||
** <b>Services</b> | |||
*** Python3: updated version to 3.11.7 | |||
---- | |||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.9/TAP100/TAP100_R_00.07.09_WEBUI.bin TAP100_R_00.07.09]</span></b> | 2024.09.03=== | |||
* <b>New</b> | |||
** <b>Network</b> | |||
*** Wireless: added option to enable 802.11w Management frame protection when using non-WPA3 encryption | |||
** <b>System</b> | |||
*** WebUI: added notifications menu | |||
* <b>Improvements</b> | |||
** <b>Network</b> | |||
*** Wireless: increased EAP authentication logging | |||
*** Wireless: added insecure configuration warnings when configuring SSIDs | |||
*** Wireless: updated wireless cards to display each radio device's signal quality and band data | |||
*** Wireless: reduced time required for Fast Transition in STA mode | |||
** <b>System</b> | |||
*** Access Control: improved system user's access control rules logic | |||
*** Access Control: added option to disable password auth for the root user | |||
*** Backup: improved backup page by splitting it into backup and reset settings page | |||
*** Update Firmware: changed firmware update log to include firmware version | |||
*** WebUI: updated firmware and backup verification pages design | |||
*** WebUI: improved global alerts display | |||
*** WebUI: adjusted overview page layout design | |||
*** Kernel: updated version to 5.15.162 | |||
* <b>Fix</b> | |||
** <b>Network</b> | |||
*** Network: fixed Ethernet switch port state change tracking logic | |||
*** Wireless: fixed wireless status API response to contain separate interface information for multiple radio configurations | |||
** <b>System</b> | |||
*** API Core: fixed file deletion | |||
*** Boot: fixed Teltonika logo in httpd recovery page when using Firefox | |||
*** Troubleshoot: fixed troubleshoot not including all the log files when log to flash is enabled | |||
*** User Settings: fixed page to show groups and users if the user has been granted access | |||
*** WebUI: fixed overview page to display active wireless (WLAN) clients | |||
* <b>CVE Patches</b> | |||
** CVE-2021-32292 | |||
** CVE-2022-40617 | |||
** CVE-2023-49441 | |||
** CVE-2024-0397 | |||
** CVE-2024-3596 | |||
** CVE-2024-5535 | |||
** CVE-2024-8088 | |||
** CVE-2024-26669 | |||
** CVE-2024-26739 | |||
** CVE-2024-26740 | |||
** CVE-2024-36901 | |||
---- | |||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.8.2/TAP100/TAP100_R_00.07.08.2_WEBUI.bin TAP100_R_00.07.08.2]</span></b> | 2024.08.12=== | |||
* <b>Fix</b> | |||
** <b>System</b> | |||
*** Update Firmware: fixed inconsistent firmware download from FOTA | |||
---- | |||
===<b>TAP100_R_00.07.08.1</b> | 2024.08.06=== | |||
<b>Note:</b> This firmware version was removed due to an issue with FOTA firmware download. | |||
* <b>Fix</b> | |||
** <b>Network</b> | |||
*** Network: fixed default route not being added for PPPoE connections | |||
** <b>System</b> | |||
*** WebUI: fixed SDK WebUI package compilation | |||
---- | |||
===<b>TAP100_R_00.07.08</b> | 2024.07.18=== | |||
<b>Note:</b> This firmware version was removed due to an issue with FOTA firmware download. | |||
* <b>New</b> | |||
** <b>Network</b> | |||
*** 802.1X: added client support | |||
** <b>Services</b> | |||
*** Wifi Scanner: added support | |||
** <b>System</b> | |||
*** API Core: added option to configure api session timeout | |||
*** UI Core: added data analytics support | |||
*** Update Firmware: added warning message about device being temporarily unreachable on firmware update | |||
* <b>Improvements</b> | |||
** <b>Network</b> | |||
*** Wireless: added warning when user configures mesh on radio with automatic frequency channel | |||
*** Wireless: added support for wireless MAC-filter MAC ranges | |||
*** Wireless: changed Radius Accounting port is not required when configuring access point with enterprise encryption | |||
*** Wireless: refactored radio configuration page layout | |||
*** Wireless: refactored assignment of wireless interfaces MAC addresses, STA interface will always use fixed address | |||
** <b>Services</b> | |||
*** stunnel: updated version to 5.72 | |||
** <b>System</b> | |||
*** Access Control: added certificate key length warnings | |||
*** Access Control: adjusted access control when all pages are blocked | |||
*** Access Control: added certificate file download for CLI to work on all browsers | |||
*** API Core: implemented functionality to include warning messages for vulnerable certificates | |||
*** RutOS: improved GPL example page to align with new software architecture | |||
*** Troubleshoot: added support for multiple syslog servers | |||
*** UI Core: added additional message with IP address to loading screen for scenarios when redirect to different IP address happens | |||
*** UI Core: added toast message hiding when text is too long | |||
*** Update Firmware: added 'Firmware version' data in screen after firmware upload | |||
*** WebUI: added functionality to cancel loading screen if it takes 30 or more seconds | |||
*** WebUI: removed all ubus method calls from webui | |||
*** WebUI: added password generator for first login modal | |||
*** WebUI: added sticky position to side menu | |||
*** WebUI: added default password hint to login error message | |||
*** WebUI: added warning messages for low-security certificates | |||
*** Kernel: updated version to 5.15.159 | |||
*** libexpat: updated version to 2.6.2 | |||
*** SSL/TLS: updated version to 3.0.14 | |||
*** vue: updated version to 3.4 | |||
* <b>Fix</b> | |||
** <b>Network</b> | |||
*** Network: fixed overriding MAC address for interfaces that are bridged | |||
*** Network: fixed missing default route when static mode is selected | |||
*** Network: fixed tapxxx.rutos.net DNS resolution | |||
*** Wireless: fixed wireless scan results sometimes not being returned | |||
*** Wireless: fixed API POST validation without sending "mode" option | |||
*** Wireless: removed the ability to have different countries in radio configurations | |||
*** Wireless: fixed interface delete when it's unassigned from the wireless interface in access point mode | |||
*** Wireless: fixed backticks for WiFi SSID are not allowed in WebUI | |||
** <b>System</b> | |||
*** Access Control: fixed download certificate button to be visible | |||
*** Administration: fixed repeated validation on cleared inputs and added validation when new password matches the old one | |||
*** API Core: fixed API method validation during upload action | |||
*** API Core: fixed error messages for POST method | |||
*** API Core: fixed option list validation | |||
*** Boot: fixed factory settings restore (firstboot) not deleting hidden files | |||
*** Events Log: fixed refresh button in event log table | |||
*** IP Block: fixed adding MAC addresses back to whitelist when unblocking all of them | |||
*** System Status: fixed wireless MAC address display value if radio is disabled | |||
*** Troubleshoot: fixed system log and kernel log buttons to be enabled with read only rights | |||
*** Update Firmware: fixed misleading "Firmware version" status of "N/A" to "FOTA service is disabled" when FOTA is disabled | |||
*** Update Firmware: fixed issue when infinite spinner appears after updating device firmware from server without having internet connection | |||
* <b>CVE Patches</b> | |||
** Patched CVE-2023-52425 | |||
** Patched CVE-2023-52530 | |||
** Patched CVE-2024-25629 | |||
** Patched CVE-2024-28757 | |||
---- | |||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.7.3/TAP100/TAP100_R_00.07.07.3_WEBUI.bin TAP100_R_00.07.07.3]</span></b> | 2024.06.25=== | ===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.7.3/TAP100/TAP100_R_00.07.07.3_WEBUI.bin TAP100_R_00.07.07.3]</span></b> | 2024.06.25=== | ||
* <b>Fix</b> | |||
** <b>Network</b> | |||
*** WebUI: fixed port advertisement change | |||
** <b>System</b> | |||
*** FOTA: fixed config when upgrading from older firmware with keep settings | |||
* <b>CVE Patches</b> | |||
** CVE-2024-31950 | |||
** CVE-2024-31951 | |||
---- | ---- | ||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.7.2/TAP100/TAP100_R_00.07.07.2_WEBUI.bin TAP100_R_00.07.07.2]</span></b> | 2024.06.12=== | ===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.7.2/TAP100/TAP100_R_00.07.07.2_WEBUI.bin TAP100_R_00.07.07.2]</span></b> | 2024.06.12=== | ||
* <b>Improvements</b> | * <b>Improvements</b> | ||
Line 27: | Line 222: | ||
---- | ---- | ||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.7.1/TAP100/TAP100_R_00.07.07.1_WEBUI.bin TAP100_R_00.07.07.1]</span></b> | 2024.05.03=== | ===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.7.1/TAP100/TAP100_R_00.07.07.1_WEBUI.bin TAP100_R_00.07.07.1]</span></b> | 2024.05.03=== | ||
* <b>New</b> | * <b>New</b> | ||
** <b>System</b> | ** <b>System</b> | ||
Line 70: | Line 264: | ||
** CVE-2024-27913 | ** CVE-2024-27913 | ||
** CVE-2024-22365 | ** CVE-2024-22365 | ||
---- | |||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.10/TAP100/TAP100_R_00.07.06.10_WEBUI.bin TAP100_R_00.07.06.10]</span></b> | 2024.04.04=== | ===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.10/TAP100/TAP100_R_00.07.06.10_WEBUI.bin TAP100_R_00.07.06.10]</span></b> | 2024.04.04=== | ||
* <b>Fix</b> | |||
** <b>System</b> | |||
*** Ledman: fixed memory leak | |||
---- | ---- | ||
===<b>TAP100_R_00.07.06.8</b> | 2024.03.25=== | ===<b>TAP100_R_00.07.06.8</b> | 2024.03.25=== | ||
---- | ---- | ||
* Firmware <b>R_00.07.06.8</b> was removed due to an issue with inefficient memory allocation for LED control. | * Firmware <b>R_00.07.06.8</b> was removed due to an issue with inefficient memory allocation for LED control. | ||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.6/TAP100/TAP100_R_00.07.06.6_WEBUI.bin TAP100_R_00.07.06.6]</span></b> | 2024.03.04=== | ===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.6/TAP100/TAP100_R_00.07.06.6_WEBUI.bin TAP100_R_00.07.06.6]</span></b> | 2024.03.04=== | ||
* <b>New</b> | |||
** <b>System</b> | |||
*** Minified *.svg WebUI files to save space on the device | |||
* <b>Fix</b> | |||
** <b>Network</b> | |||
*** Fixed the issue with Wireless bgscan functionality not operating correctly | |||
---- | ---- | ||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.5/TAP100/TAP100_R_00.07.06.5_WEBUI.bin TAP100_R_00.07.06.5]</span></b> | 2024.02.21=== | ===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.5/TAP100/TAP100_R_00.07.06.5_WEBUI.bin TAP100_R_00.07.06.5]</span></b> | 2024.02.21=== | ||
* <b>Fix</b> | |||
** <b>System</b> | |||
*** Fixed year 2038 problem with time counter overflow | |||
---- | ---- | ||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.3/TAP100/TAP100_R_00.07.06.3_WEBUI.bin TAP100_R_00.07.06.3]</span></b> | 2024.01.17=== | ===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.3/TAP100/TAP100_R_00.07.06.3_WEBUI.bin TAP100_R_00.07.06.3]</span></b> | 2024.01.17=== | ||
* <b>Fix</b> | |||
** <b>System</b> | |||
*** Patched CVE-2024-0193 vulnerability | |||
*** Patched CVE-2023-51779 vulnerability | |||
*** Updated OpenSSH to 9.6p1 version, fixed CVE-2023-51385 and CVE-2023-51384 | |||
*** Fixed profile migrations, added error handling when trying to change profile while it is still applying | |||
---- | ---- | ||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.1/TAP100/TAP100_R_00.07.06.1_WEBUI.bin TAP100_R_00.07.06.1]</span></b> | 2024.01.04=== | ===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.1/TAP100/TAP100_R_00.07.06.1_WEBUI.bin TAP100_R_00.07.06.1]</span></b> | 2024.01.04=== | ||
* <b>Fix</b> | * <b>Fix</b> | ||
** <b>Services</b> | ** <b>Services</b> | ||
*** Fixed issue with NTPclient zombie processes | *** Fixed issue with NTPclient zombie processes | ||
---- | |||
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6/TAP100/TAP100_R_00.07.06_WEBUI.bin TAP100_R_00.07.06]</span></b> | 2023.12.20=== | ===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6/TAP100/TAP100_R_00.07.06_WEBUI.bin TAP100_R_00.07.06]</span></b> | 2023.12.20=== | ||
Line 200: | Line 408: | ||
*** Patched CVE-2023-29469 vulnerability | *** Patched CVE-2023-29469 vulnerability | ||
*** Patched CVE-2023-31490 vulnerability | *** Patched CVE-2023-31490 vulnerability | ||
*** Patched CVE- | *** Patched CVE-2021-36369 vulnerability | ||
*** Patched CVE-2023-48174 vulnerability | *** Patched CVE-2023-48174 vulnerability | ||
*** Fixed Events Log database rotation to prevent log partition space exhaustion | *** Fixed Events Log database rotation to prevent log partition space exhaustion |
Latest revision as of 11:02, 6 November 2024
Main Page > TAP Access Points > TAP100 > TAP100 Firmware DownloadsThis page contains firmware files for TAP100 devices. Look to the table below or the changelog to find download links.
To upgrade firmware using WebUI, follow the instructions in TAP100 Firmware.
TAP100
File | Type | Release date | Size | MD5 | Changelog |
---|---|---|---|---|---|
TAP100_R_00.07.10.2_WEBUI.bin | Latest FW | 2024.11.04 | 8.88 MB | 950685e765d0fabb605b3a15297b6fc4 | Link |
TAP100_R_00.07.09.4_WEBUI.bin | Mass production FW | 2024.10.02 | 8.81 MB | 759c86c4cdfee135f8ba5da355a833cf | Link |
TAP100_R_GPL_00.07.10.2.tar.gz | SDK | 2024.11.04 | 10.02 MB | 8540f64a153bc039b81441dcdc26e79b |
FW checksums
Checksums for firmware files can be found here.
Changelog
TAP100_R_00.07.10.2 | 2024.11.04
- Firmware includes no changes for this device
TAP100_R_00.07.10 | 2024.10.10
- New
- Network
- Wireless: added noise value calculation
- Services
- RMS: added SOCKS5 proxy support
- Network
- Improvements
- Network
- Curl: added unix socket support
- Network: improved performance under stateless single-directional traffic (RFC2544)
- Wireless: added interface status message when DFS CAC is in progress
- System
- Access Control: refactored 'General', 'Security' web pages
- Auto Reboot: added support for multiple hosts/URLs in Ping/Wget Reboot
- Backup: encrypting backup does not require 7zip package anymore
- WebUI: added ability to open new page in new tab without entering user credentials
- WebUI: improved SDK example application
- Glib2: updated version to 2.80.5
- Ncurses: updated version to 6.5
- Network
- Fix
- Network
- Wireless: fixed BSSID show for interface in Client mode
- Wireless: fixed hostapd ubus call timeout after wireless configuration change
- Services
- Ledman: fixed issue when power LED turns off when rebooting device
- System
- CLI: fixed some private IPs being incorrectly determined as public
- JSON-RPC: fixed login "Access Denied" error
- WebUI: fixed 'Memory' status card progress bars visuals
- WebUI: fixed search bar suggestions after removing packages
- WebUI: fixed custom SDK pages not loading correctly
- Network
- CVE Patches
- CVE-2021-3520
- CVE-2021-44540
- CVE-2021-44541
- CVE-2024-4032
- CVE-2024-6119
- CVE-2024-6232
- CVE-2024-6923
- CVE-2024-7264
- CVE-2024-42225
TAP100_R_00.07.09.4 | 2024.10.02
- Improvements
- Services
- NTP Client: changed default NTP servers
- Services
- Fix
- Services
- NTP Client: fixed NTP server usage to work with next in line server if current server does not respond
- Services
TAP100_R_00.07.09.3 | 2024.09.27
- Firmware includes no changes for this device
TAP100_R_00.07.09.1 | 2024.09.13
- Improvements
- Services
- Python3: updated version to 3.11.7
- Services
TAP100_R_00.07.09 | 2024.09.03
- New
- Network
- Wireless: added option to enable 802.11w Management frame protection when using non-WPA3 encryption
- System
- WebUI: added notifications menu
- Network
- Improvements
- Network
- Wireless: increased EAP authentication logging
- Wireless: added insecure configuration warnings when configuring SSIDs
- Wireless: updated wireless cards to display each radio device's signal quality and band data
- Wireless: reduced time required for Fast Transition in STA mode
- System
- Access Control: improved system user's access control rules logic
- Access Control: added option to disable password auth for the root user
- Backup: improved backup page by splitting it into backup and reset settings page
- Update Firmware: changed firmware update log to include firmware version
- WebUI: updated firmware and backup verification pages design
- WebUI: improved global alerts display
- WebUI: adjusted overview page layout design
- Kernel: updated version to 5.15.162
- Network
- Fix
- Network
- Network: fixed Ethernet switch port state change tracking logic
- Wireless: fixed wireless status API response to contain separate interface information for multiple radio configurations
- System
- API Core: fixed file deletion
- Boot: fixed Teltonika logo in httpd recovery page when using Firefox
- Troubleshoot: fixed troubleshoot not including all the log files when log to flash is enabled
- User Settings: fixed page to show groups and users if the user has been granted access
- WebUI: fixed overview page to display active wireless (WLAN) clients
- Network
- CVE Patches
- CVE-2021-32292
- CVE-2022-40617
- CVE-2023-49441
- CVE-2024-0397
- CVE-2024-3596
- CVE-2024-5535
- CVE-2024-8088
- CVE-2024-26669
- CVE-2024-26739
- CVE-2024-26740
- CVE-2024-36901
TAP100_R_00.07.08.2 | 2024.08.12
- Fix
- System
- Update Firmware: fixed inconsistent firmware download from FOTA
- System
TAP100_R_00.07.08.1 | 2024.08.06
Note: This firmware version was removed due to an issue with FOTA firmware download.
- Fix
- Network
- Network: fixed default route not being added for PPPoE connections
- System
- WebUI: fixed SDK WebUI package compilation
- Network
TAP100_R_00.07.08 | 2024.07.18
Note: This firmware version was removed due to an issue with FOTA firmware download.
- New
- Network
- 802.1X: added client support
- Services
- Wifi Scanner: added support
- System
- API Core: added option to configure api session timeout
- UI Core: added data analytics support
- Update Firmware: added warning message about device being temporarily unreachable on firmware update
- Network
- Improvements
- Network
- Wireless: added warning when user configures mesh on radio with automatic frequency channel
- Wireless: added support for wireless MAC-filter MAC ranges
- Wireless: changed Radius Accounting port is not required when configuring access point with enterprise encryption
- Wireless: refactored radio configuration page layout
- Wireless: refactored assignment of wireless interfaces MAC addresses, STA interface will always use fixed address
- Services
- stunnel: updated version to 5.72
- System
- Access Control: added certificate key length warnings
- Access Control: adjusted access control when all pages are blocked
- Access Control: added certificate file download for CLI to work on all browsers
- API Core: implemented functionality to include warning messages for vulnerable certificates
- RutOS: improved GPL example page to align with new software architecture
- Troubleshoot: added support for multiple syslog servers
- UI Core: added additional message with IP address to loading screen for scenarios when redirect to different IP address happens
- UI Core: added toast message hiding when text is too long
- Update Firmware: added 'Firmware version' data in screen after firmware upload
- WebUI: added functionality to cancel loading screen if it takes 30 or more seconds
- WebUI: removed all ubus method calls from webui
- WebUI: added password generator for first login modal
- WebUI: added sticky position to side menu
- WebUI: added default password hint to login error message
- WebUI: added warning messages for low-security certificates
- Kernel: updated version to 5.15.159
- libexpat: updated version to 2.6.2
- SSL/TLS: updated version to 3.0.14
- vue: updated version to 3.4
- Network
- Fix
- Network
- Network: fixed overriding MAC address for interfaces that are bridged
- Network: fixed missing default route when static mode is selected
- Network: fixed tapxxx.rutos.net DNS resolution
- Wireless: fixed wireless scan results sometimes not being returned
- Wireless: fixed API POST validation without sending "mode" option
- Wireless: removed the ability to have different countries in radio configurations
- Wireless: fixed interface delete when it's unassigned from the wireless interface in access point mode
- Wireless: fixed backticks for WiFi SSID are not allowed in WebUI
- System
- Access Control: fixed download certificate button to be visible
- Administration: fixed repeated validation on cleared inputs and added validation when new password matches the old one
- API Core: fixed API method validation during upload action
- API Core: fixed error messages for POST method
- API Core: fixed option list validation
- Boot: fixed factory settings restore (firstboot) not deleting hidden files
- Events Log: fixed refresh button in event log table
- IP Block: fixed adding MAC addresses back to whitelist when unblocking all of them
- System Status: fixed wireless MAC address display value if radio is disabled
- Troubleshoot: fixed system log and kernel log buttons to be enabled with read only rights
- Update Firmware: fixed misleading "Firmware version" status of "N/A" to "FOTA service is disabled" when FOTA is disabled
- Update Firmware: fixed issue when infinite spinner appears after updating device firmware from server without having internet connection
- Network
- CVE Patches
- Patched CVE-2023-52425
- Patched CVE-2023-52530
- Patched CVE-2024-25629
- Patched CVE-2024-28757
TAP100_R_00.07.07.3 | 2024.06.25
- Fix
- Network
- WebUI: fixed port advertisement change
- System
- FOTA: fixed config when upgrading from older firmware with keep settings
- Network
- CVE Patches
- CVE-2024-31950
- CVE-2024-31951
TAP100_R_00.07.07.2 | 2024.06.12
- Improvements
- Services
- Wireless: removed unnecessary information from system logs
- System
- SSH: removed weak SSH algorithms
- Services
- Fix
- System
- IP Block: fixed blocking of UDP traffic
- Ledman: fixed WiFi LED indication when WiFi configuration is changed
- Uboot: fixed firmware recovery update via uboot on Windows
- System
- CVE Patches
- CVE-2024-31948
TAP100_R_00.07.07.1 | 2024.05.03
- New
- System
- WebUI: added the ability to generate random passwords for password input fields
- WebUI: added reset to “Factory defaults” option
- System: changed firmware certificate verification tool
- IP Block: added time-based login attempt blocking
- WebUI: added firmware update notification support
- Logging: added multiple remote syslog servers support
- System
- Improvements
- Services
- WebUI: moved licenses to footer
- System
- WebUI: adjusted responsive design breakpoints
- WebUI: added more strict password requirements for restoring backup
- WebUI: changed firmware update option to server as a default option
- WebUI: improved first login password change logic
- GPL: added offline package preparation command for GPL builds
- Kernel: updated to version 5.15.149
- Libcap: updated package version to 2.69
- Services
- Fix
- System
- WebUI: fixed an issue when a user was not logged out after changing profiles
- CLI: fixed enter key issue on mobile chromium based browsers
- System
- CVE Patches
- CVE-2022-4603
- CVE-2022-23308
- CVE 2022-45061
- CVE-2023-0466
- CVE-2023-6129
- CVE-2023-7042
- CVE 2023-24329
- CVE 2023-27043
- CVE-2023-42366
- CVE-2023-46218
- CVE-2023-46219
- CVE-2023-46752
- CVE-2023-46753
- CVE-2023-48795
- CVE-2024-2397
- CVE-2024-25062
- CVE-2024-27913
- CVE-2024-22365
TAP100_R_00.07.06.10 | 2024.04.04
- Fix
- System
- Ledman: fixed memory leak
- System
TAP100_R_00.07.06.8 | 2024.03.25
- Firmware R_00.07.06.8 was removed due to an issue with inefficient memory allocation for LED control.
TAP100_R_00.07.06.6 | 2024.03.04
- New
- System
- Minified *.svg WebUI files to save space on the device
- System
- Fix
- Network
- Fixed the issue with Wireless bgscan functionality not operating correctly
- Network
TAP100_R_00.07.06.5 | 2024.02.21
- Fix
- System
- Fixed year 2038 problem with time counter overflow
- System
TAP100_R_00.07.06.3 | 2024.01.17
- Fix
- System
- Patched CVE-2024-0193 vulnerability
- Patched CVE-2023-51779 vulnerability
- Updated OpenSSH to 9.6p1 version, fixed CVE-2023-51385 and CVE-2023-51384
- Fixed profile migrations, added error handling when trying to change profile while it is still applying
- System
TAP100_R_00.07.06.1 | 2024.01.04
- Fix
- Services
- Fixed issue with NTPclient zombie processes
- Services
TAP100_R_00.07.06 | 2023.12.20
- New
- Network
- Added 802.11v BSS Transition Management and 802.11k Radio Resource Measurement
- WebUI
- Renewed user interface design
- Added network interface name change functionality
- System
- API support
- Network
- Improvements
- Network
- Added two radio support on one SSID in Wireless
- WebUI
- Improved Events Log page loading by adding asynchronous pagination (pasikeitė puslapiavimo logika nei prieš tai buvusi)
- Added auto redirect after changing router's IP address or port
- Moved device menu entry “Reboot” to header menu
- System
- Updated kernel version to 5.4.259
- Added RMS data display to generated troubleshoot
- Added process activity load list to generated troubleshoot
- Network
- Fix
- Services
- Added minimum free space check when saving logs to flash in Logging service
- WebUI
- Fixed side menu style issues when Japanese language is used
- Fixed displaying of vendor names in Topology page
- Fixed language packs being selectable when still in Package Manager queue
- Fixed realtime graphs responsive design issues
- Fixed wireless realtime data to show signal as unavailable with no connected clients
- Fixed setup wizard errors in Wireless configuration page
- System
- Patched OpenSSL CVE-2023-3446
- Patched OpenSSL CVE-2023-3817
- Patched LibXML2 CVE-2023-39615
- Patched LibXML2 CVE-2023-45322
- Services
TAP100_R_00.07.05.4 | 2023.11.09
- Improvements
- WebUI
- Improved asynchronous pagination in events log pages
- Optimized Overview page load
- Added resource loading cancellation after switching to different page
- WebUI
TAP100_R_00.07.05 | 2023.10.09
- New
- Network
- Fast transition and EAP authentication support for Wireless
- WebUI
- Page search feature
- "Reconnect" button in RMS page
- Wireless interface QR code generator
- Auto Reboot service
- System
- Mechanism to rebrand WebUI using GPL
- Possiblity to create web applications with closed-source GPL
- Network
- Improvements
- WebUI
- Reorganized menu
- Updated header design
- Improved file upload component's visual appearance
- System
- Updated kernel version to 5.4.251
- Updated UCI version to 2021-10-22
- Updated cURL version to 8.2.0
- Updated C-ares version to 1.19.1
- Updated iproute2 version to 5.19.0
- Updated libubox package version to 2021-08-19
- Added CVE patch CVE-2023-2650
- Added additional firmware information in CLI prompt banner
- Connection mode LED now blinks on data transfer
- Changed "routername" to "devicename" in system config file
- Made all clients get disconnected out once dropbear service is disabled
- Device name is now displayed in browser tab when in WebUI login page
- Added NF conntrack information in generated troubleshoot archive
- WebUI
- Fix
- Network
- Fixed Wireless transmit power changing without user input after saving different country code
- Fixed clients isolation functionality in Wireless
- Fixed issue where Wireless SSIDs with custom VLANs weren't leasing IP addresses
- Services
- Fixed showing incorrect Internet state in RMS
- Implemented error handling when device is blocked or unrecognized by RMS
- Fixed disabled CLI remote access taking up a session slot
- WebUI
- Fixed modal form inputs not clearing upon closing after nested modal is saved
- Fixed select menu closing when selecting custom option
- Fixed multi select expanding table row when adding new values
- Fixed global section caching after deleting a section in a table
- Fixed unpredictable search logic in tables
- Fixed profile creation when current configuration is not present
- Fixed wrong protocol data display in "Access control" page
- System
- Patched CVE-2023-0386 vulnerability
- Patched CVE-2023-0464 vulnerability
- Patched CVE-2023-0465 vulnerability
- Patched CVE-2023-2602 vulnerability
- Patched CVE-2023-3772 vulnerability
- Patched CVE-2023-4128 vulnerability
- Patched CVE-2023-33476 vulnerability
- Patched CVE-2023-28484 vulnerability
- Patched CVE-2023-29469 vulnerability
- Patched CVE-2023-31490 vulnerability
- Patched CVE-2021-36369 vulnerability
- Patched CVE-2023-48174 vulnerability
- Fixed Events Log database rotation to prevent log partition space exhaustion
- Fixed duplication and sorting of all events IDs in Events Log
- Fixed FOTA crash when current hours is with leading 0
- Fixed crontab job removal after disabling FOTA
- Fixed device name resetting to default upon refresh in Administration
- Network
TAP100_R_00.07.04.5 | 2023.07.24
- Fix
- Network
- Fixed issues with device domain resolving
- Network
TAP100_R_00.07.04.4 | 2023.06.26
- Improvements
- System
- Device name is now displayed in browser tab when in login page
- System
- Fix
- Network
- Patched CVE-2023-32233 vulnerability
- Network
- Services
- Fixed connection establishment for RMS MQTT service
- Implemented partial restart when connection with RMS server fails
- Fixed device name resetting to default upon WebUI page refresh
- Fixed being able to set device name without passing validations
- Services
TAP100_R_00.07.04.3 | 2023.05.11
- New
- Initial firmware release