Difference between revisions of "TAP100 Firmware Downloads"

From Teltonika Networks Wiki
m (Text replacement - "2023-36369" to "2021-36369")
 
Line 9: Line 9:
 
==Changelog==
 
==Changelog==
 
<!--NEW_FW-->
 
<!--NEW_FW-->
 +
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.8/TAP100/TAP100_R_00.07.08_WEBUI.bin TAP100_R_00.07.08]</span></b> | 2024.07.18===
 +
* <b>New</b>
 +
** <b>Network</b>
 +
*** 802.1X: added client support
 +
** <b>Services</b>
 +
*** Wifi Scanner: added support
 +
** <b>System</b>
 +
*** API Core: added option to configure api session timeout
 +
*** UI Core: added data analytics support
 +
*** Update Firmware: added warning message about device being temporarily unreachable on firmware update
 +
* <b>Improvements</b>
 +
** <b>Network</b>
 +
*** Wireless: added warning when user configures mesh on radio with automatic frequency channel
 +
*** Wireless: added support for wireless MAC-filter MAC ranges
 +
*** Wireless: changed Radius Accounting port is not required when configuring access point with enterprise encryption
 +
*** Wireless: refactored radio configuration page layout
 +
*** Wireless: refactored assignment of wireless interfaces MAC addresses, STA interface will always use fixed address
 +
** <b>Services</b>
 +
*** stunnel: updated version to 5.72
 +
** <b>System</b>
 +
*** Access Control: added certificate key length warnings
 +
*** Access Control: adjusted access control when all pages are blocked
 +
*** Access Control: added certificate file download for CLI to work on all browsers
 +
*** API Core: implemented functionality to include warning messages for vulnerable certificates
 +
*** RutOS: improved GPL example page to align with new software architecture
 +
*** Troubleshoot: added support for multiple syslog servers
 +
*** UI Core: added additional message with IP address to loading screen for scenarios when redirect to different IP address happens
 +
*** UI Core: added toast message hiding when text is too long
 +
*** Update Firmware: added 'Firmware version' data in screen after firmware upload
 +
*** WebUI: added functionality to cancel loading screen if it takes 30 or more seconds
 +
*** WebUI: removed all ubus method calls from webui
 +
*** WebUI: added password generator for first login modal
 +
*** WebUI: added sticky position to side menu
 +
*** WebUI: added default password hint to login error message
 +
*** WebUI: added warning messages for low-security certificates
 +
*** Kernel: updated version to 5.15.159
 +
*** libexpat: updated version to 2.6.2
 +
*** SSL/TLS: updated version to 3.0.14
 +
*** vue: updated version to 3.4
 +
* <b>Fix</b>
 +
** <b>Network</b>
 +
*** Network: fixed overriding MAC address for interfaces that are bridged
 +
*** Network: fixed missing default route when static mode is selected
 +
*** Network: fixed tapxxx.rutos.net DNS resolution
 +
*** Wireless: fixed wireless scan results sometimes not being returned
 +
*** Wireless: fixed API POST validation without sending "mode" option
 +
*** Wireless: removed the ability to have different countries in radio configurations
 +
*** Wireless: fixed interface delete when it's unassigned from the wireless interface in access point mode
 +
*** Wireless: fixed backticks for WiFi SSID are not allowed in WebUI
 +
** <b>System</b>
 +
*** Access Control: fixed download certificate button to be visible
 +
*** Administration: fixed repeated validation on cleared inputs and added validation when new password matches the old one
 +
*** API Core: fixed API method validation during upload action
 +
*** API Core: fixed error messages for POST method
 +
*** API Core: fixed option list validation
 +
*** Boot: fixed factory settings restore (firstboot) not deleting hidden files
 +
*** Events Log: fixed refresh button in event log table
 +
*** IP Block: fixed adding MAC addresses back to whitelist when unblocking all of them
 +
*** System Status: fixed wireless MAC address display value if radio is disabled
 +
*** Troubleshoot: fixed system log and kernel log buttons to be enabled with read only rights
 +
*** Update Firmware: fixed misleading "Firmware version" status of "N/A" to "FOTA service is disabled" when FOTA is disabled
 +
*** Update Firmware: fixed issue when infinite spinner appears after updating device firmware from server without having internet connection
 +
* <b>CVE Patches</b>
 +
** Patched CVE-2023-52425
 +
** Patched CVE-2023-52530
 +
** Patched CVE-2024-25629
 +
** Patched CVE-2024-28757
 +
----
 
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.7.3/TAP100/TAP100_R_00.07.07.3_WEBUI.bin TAP100_R_00.07.07.3]</span></b> | 2024.06.25===
 
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.7.3/TAP100/TAP100_R_00.07.07.3_WEBUI.bin TAP100_R_00.07.07.3]</span></b> | 2024.06.25===
 
* <b>Fix</b>
 
* <b>Fix</b>

Latest revision as of 15:38, 18 July 2024

Main Page > TAP Access Points > TAP100 > TAP100 Firmware Downloads

This page contains firmware files for TAP100 devices. Look to the table below or the changelog to find download links.

To upgrade firmware using WebUI, follow the instructions in TAP100 Firmware.

TAP100

File Type Release date Size MD5 Changelog
TAP100_R_00.07.08_WEBUI.bin Latest FW 2024.07.18 8.75 MB 06021015f479ad24cdea6c4bb0ce66b1 Link
TAP100_R_00.07.07.2_WEBUI.bin Mass production FW 2024.06.12 8.63 MB 62e4779462f82d9f8d306a014add2c4a Link
TAP100_R_GPL_00.07.08.tar.gz SDK 2024.07.18 9.56 MB e49f319cdc7225331c166b3a7711ced9



FW checksums


Checksums for firmware files can be found here.

Changelog

TAP100_R_00.07.08 | 2024.07.18

  • New
    • Network
      • 802.1X: added client support
    • Services
      • Wifi Scanner: added support
    • System
      • API Core: added option to configure api session timeout
      • UI Core: added data analytics support
      • Update Firmware: added warning message about device being temporarily unreachable on firmware update
  • Improvements
    • Network
      • Wireless: added warning when user configures mesh on radio with automatic frequency channel
      • Wireless: added support for wireless MAC-filter MAC ranges
      • Wireless: changed Radius Accounting port is not required when configuring access point with enterprise encryption
      • Wireless: refactored radio configuration page layout
      • Wireless: refactored assignment of wireless interfaces MAC addresses, STA interface will always use fixed address
    • Services
      • stunnel: updated version to 5.72
    • System
      • Access Control: added certificate key length warnings
      • Access Control: adjusted access control when all pages are blocked
      • Access Control: added certificate file download for CLI to work on all browsers
      • API Core: implemented functionality to include warning messages for vulnerable certificates
      • RutOS: improved GPL example page to align with new software architecture
      • Troubleshoot: added support for multiple syslog servers
      • UI Core: added additional message with IP address to loading screen for scenarios when redirect to different IP address happens
      • UI Core: added toast message hiding when text is too long
      • Update Firmware: added 'Firmware version' data in screen after firmware upload
      • WebUI: added functionality to cancel loading screen if it takes 30 or more seconds
      • WebUI: removed all ubus method calls from webui
      • WebUI: added password generator for first login modal
      • WebUI: added sticky position to side menu
      • WebUI: added default password hint to login error message
      • WebUI: added warning messages for low-security certificates
      • Kernel: updated version to 5.15.159
      • libexpat: updated version to 2.6.2
      • SSL/TLS: updated version to 3.0.14
      • vue: updated version to 3.4
  • Fix
    • Network
      • Network: fixed overriding MAC address for interfaces that are bridged
      • Network: fixed missing default route when static mode is selected
      • Network: fixed tapxxx.rutos.net DNS resolution
      • Wireless: fixed wireless scan results sometimes not being returned
      • Wireless: fixed API POST validation without sending "mode" option
      • Wireless: removed the ability to have different countries in radio configurations
      • Wireless: fixed interface delete when it's unassigned from the wireless interface in access point mode
      • Wireless: fixed backticks for WiFi SSID are not allowed in WebUI
    • System
      • Access Control: fixed download certificate button to be visible
      • Administration: fixed repeated validation on cleared inputs and added validation when new password matches the old one
      • API Core: fixed API method validation during upload action
      • API Core: fixed error messages for POST method
      • API Core: fixed option list validation
      • Boot: fixed factory settings restore (firstboot) not deleting hidden files
      • Events Log: fixed refresh button in event log table
      • IP Block: fixed adding MAC addresses back to whitelist when unblocking all of them
      • System Status: fixed wireless MAC address display value if radio is disabled
      • Troubleshoot: fixed system log and kernel log buttons to be enabled with read only rights
      • Update Firmware: fixed misleading "Firmware version" status of "N/A" to "FOTA service is disabled" when FOTA is disabled
      • Update Firmware: fixed issue when infinite spinner appears after updating device firmware from server without having internet connection
  • CVE Patches
    • Patched CVE-2023-52425
    • Patched CVE-2023-52530
    • Patched CVE-2024-25629
    • Patched CVE-2024-28757

TAP100_R_00.07.07.3 | 2024.06.25

  • Fix
    • Network
      • WebUI: fixed port advertisement change
    • System
      • FOTA: fixed config when upgrading from older firmware with keep settings
  • CVE Patches
    • CVE-2024-31950
    • CVE-2024-31951

TAP100_R_00.07.07.2 | 2024.06.12

  • Improvements
    • Services
      • Wireless: removed unnecessary information from system logs
    • System
      • SSH: removed weak SSH algorithms
  • Fix
    • System
      • IP Block: fixed blocking of UDP traffic
      • Ledman: fixed WiFi LED indication when WiFi configuration is changed
      • Uboot: fixed firmware recovery update via uboot on Windows
  • CVE Patches
    • CVE-2024-31948

TAP100_R_00.07.07.1 | 2024.05.03


  • New
    • System
      • WebUI: added the ability to generate random passwords for password input fields
      • WebUI: added reset to “Factory defaults” option
      • System: changed firmware certificate verification tool
      • IP Block: added time-based login attempt blocking
      • WebUI: added firmware update notification support
      • Logging: added multiple remote syslog servers support
  • Improvements
    • Services
      • WebUI: moved licenses to footer
    • System
      • WebUI: adjusted responsive design breakpoints
      • WebUI: added more strict password requirements for restoring backup
      • WebUI: changed firmware update option to server as a default option
      • WebUI: improved first login password change logic
      • GPL: added offline package preparation command for GPL builds
      • Kernel: updated to version 5.15.149
      • Libcap: updated package version to 2.69
  • Fix
    • System
      • WebUI: fixed an issue when a user was not logged out after changing profiles
      • CLI: fixed enter key issue on mobile chromium based browsers
  • CVE Patches
    • CVE-2022-4603
    • CVE-2022-23308
    • CVE 2022-45061
    • CVE-2023-0466
    • CVE-2023-6129
    • CVE-2023-7042
    • CVE 2023-24329
    • CVE 2023-27043
    • CVE-2023-42366
    • CVE-2023-46218
    • CVE-2023-46219
    • CVE-2023-46752
    • CVE-2023-46753
    • CVE-2023-48795
    • CVE-2024-2397
    • CVE-2024-25062
    • CVE-2024-27913
    • CVE-2024-22365

TAP100_R_00.07.06.10 | 2024.04.04


  • Global changelog for R_00.07.06.10 - LINK

TAP100_R_00.07.06.8 | 2024.03.25


  • Firmware R_00.07.06.8 was removed due to an issue with inefficient memory allocation for LED control.

TAP100_R_00.07.06.6 | 2024.03.04


  • Global changelog for R_00.07.06.6 - LINK

TAP100_R_00.07.06.5 | 2024.02.21


  • Global changelog for R_00.07.06.5 - LINK

TAP100_R_00.07.06.3 | 2024.01.17


  • Global changelog for R_00.07.06.3 - LINK

TAP100_R_00.07.06.1 | 2024.01.04

  • Fix
    • Services
      • Fixed issue with NTPclient zombie processes

TAP100_R_00.07.06 | 2023.12.20

  • New
    • Network
      • Added 802.11v BSS Transition Management and 802.11k Radio Resource Measurement
    • WebUI
      • Renewed user interface design
      • Added network interface name change functionality
    • System
      • API support
  • Improvements
    • Network
      • Added two radio support on one SSID in Wireless
    • WebUI
      • Improved Events Log page loading by adding asynchronous pagination (pasikeitė puslapiavimo logika nei prieš tai buvusi)
      • Added auto redirect after changing router's IP address or port
      • Moved device menu entry “Reboot” to header menu
    • System
      • Updated kernel version to 5.4.259
      • Added RMS data display to generated troubleshoot
      • Added process activity load list to generated troubleshoot
  • Fix
    • Services
      • Added minimum free space check when saving logs to flash in Logging service
    • WebUI
      • Fixed side menu style issues when Japanese language is used
      • Fixed displaying of vendor names in Topology page
      • Fixed language packs being selectable when still in Package Manager queue
      • Fixed realtime graphs responsive design issues
      • Fixed wireless realtime data to show signal as unavailable with no connected clients
      • Fixed setup wizard errors in Wireless configuration page
    • System
      • Patched OpenSSL CVE-2023-3446
      • Patched OpenSSL CVE-2023-3817
      • Patched LibXML2 CVE-2023-39615
      • Patched LibXML2 CVE-2023-45322

TAP100_R_00.07.05.4 | 2023.11.09

  • Improvements
    • WebUI
      • Improved asynchronous pagination in events log pages
      • Optimized Overview page load
      • Added resource loading cancellation after switching to different page

TAP100_R_00.07.05 | 2023.10.09

  • New
    • Network
      • Fast transition and EAP authentication support for Wireless
    • WebUI
      • Page search feature
      • "Reconnect" button in RMS page
      • Wireless interface QR code generator
      • Auto Reboot service
    • System
      • Mechanism to rebrand WebUI using GPL
      • Possiblity to create web applications with closed-source GPL
  • Improvements
    • WebUI
      • Reorganized menu
      • Updated header design
      • Improved file upload component's visual appearance
    • System
      • Updated kernel version to 5.4.251
      • Updated UCI version to 2021-10-22
      • Updated cURL version to 8.2.0
      • Updated C-ares version to 1.19.1
      • Updated iproute2 version to 5.19.0
      • Updated libubox package version to 2021-08-19
      • Added CVE patch CVE-2023-2650
      • Added additional firmware information in CLI prompt banner
      • Connection mode LED now blinks on data transfer
      • Changed "routername" to "devicename" in system config file
      • Made all clients get disconnected out once dropbear service is disabled
      • Device name is now displayed in browser tab when in WebUI login page
      • Added NF conntrack information in generated troubleshoot archive
  • Fix
    • Network
      • Fixed Wireless transmit power changing without user input after saving different country code
      • Fixed clients isolation functionality in Wireless
      • Fixed issue where Wireless SSIDs with custom VLANs weren't leasing IP addresses
    • Services
      • Fixed showing incorrect Internet state in RMS
      • Implemented error handling when device is blocked or unrecognized by RMS
      • Fixed disabled CLI remote access taking up a session slot
    • WebUI
      • Fixed modal form inputs not clearing upon closing after nested modal is saved
      • Fixed select menu closing when selecting custom option
      • Fixed multi select expanding table row when adding new values
      • Fixed global section caching after deleting a section in a table
      • Fixed unpredictable search logic in tables
      • Fixed profile creation when current configuration is not present
      • Fixed wrong protocol data display in "Access control" page
    • System
      • Patched CVE-2023-0386 vulnerability
      • Patched CVE-2023-0464 vulnerability
      • Patched CVE-2023-0465 vulnerability
      • Patched CVE-2023-2602 vulnerability
      • Patched CVE-2023-3772 vulnerability
      • Patched CVE-2023-4128 vulnerability
      • Patched CVE-2023-33476 vulnerability
      • Patched CVE-2023-28484 vulnerability
      • Patched CVE-2023-29469 vulnerability
      • Patched CVE-2023-31490 vulnerability
      • Patched CVE-2021-36369 vulnerability
      • Patched CVE-2023-48174 vulnerability
      • Fixed Events Log database rotation to prevent log partition space exhaustion
      • Fixed duplication and sorting of all events IDs in Events Log
      • Fixed FOTA crash when current hours is with leading 0
      • Fixed crontab job removal after disabling FOTA
      • Fixed device name resetting to default upon refresh in Administration

TAP100_R_00.07.04.5 | 2023.07.24

  • Fix
    • Network
      • Fixed issues with device domain resolving

TAP100_R_00.07.04.4 | 2023.06.26

  • Improvements
    • System
      • Device name is now displayed in browser tab when in login page
  • Fix
    • Network
      • Patched CVE-2023-32233 vulnerability
    • Services
      • Fixed connection establishment for RMS MQTT service
      • Implemented partial restart when connection with RMS server fails
      • Fixed device name resetting to default upon WebUI page refresh
      • Fixed being able to set device name without passing validations

TAP100_R_00.07.04.3 | 2023.05.11

  • New
    • Initial firmware release