RUT2M Firmware checksum list: Difference between revisions

From Teltonika Networks Wiki
No edit summary
Line 16: Line 16:
     </tr>
     </tr>
     <tr>
     <tr>
         <td><b>RUT2M_R_00.07.02.7</b></td>
         <td><b>RUT2M_R_00.07.02.9</b></td>
         <td><b>5f50beac3575ddec063ad46a0ef2f93d</b></td>
         <td><b>c884031a13c0199047e5989586911eaa</b></td>
         <td><b>2d89252930347e3755a277276528d8059858801ab7c6546e06501c5e380d6806</b></td>
         <td><b>4b8894d2854f7850a628d6bb0a74adb7052ed3f1361d82c29ab289601e93aefa</b></td>
    </tr>
    <tr>
        <td>RUT2M_R_00.07.02.7</td>
        <td>5f50beac3575ddec063ad46a0ef2f93d</td>
        <td>2d89252930347e3755a277276528d8059858801ab7c6546e06501c5e380d6806</td>
     </tr>
     </tr>
     <tr>
     <tr>

Revision as of 13:28, 14 November 2022

Summary

A checksum is a sequence of hexadecimal symbols generated after running an algorithm called a cryptographic hash function on a file. Calculating a checksum and comparing it with the one provided by the file source can be used as a file authenticity check method.

For example, if you download a file like a firmware image, you should be able to calculate that file's checksum and, if the file is authentic, the checksum should match the one provided by the file's source. If the checksums don't match, it means the file's contents were tampered with, for example, by a malicious third party attacker. This file is probably dangerous and shouldn't be trusted.

Checksum list

Firmware file checksums are listed by firmware release date, from newest to oldest (top to bottom).

FW version MD5 checksum SHA256 checksum
RUT2M_R_00.07.02.9 c884031a13c0199047e5989586911eaa 4b8894d2854f7850a628d6bb0a74adb7052ed3f1361d82c29ab289601e93aefa
RUT2M_R_00.07.02.7 5f50beac3575ddec063ad46a0ef2f93d 2d89252930347e3755a277276528d8059858801ab7c6546e06501c5e380d6806
RUT2M_R_00.07.02.5 3d9f8aa27da9c7ecb3e0cee5c66588c8 9e5aa52d6c37736117b545a966fecedf583bdec3be53611dea0657e1fcdef1a8
RUT2M_R_00.07.02.4 efab90bd37f947fa1a5e403bdf07ded0 ae0772e68d600d5544caea641878b8a6a75a346e5c9ad1831f9652621528ffbd
RUT2M_R_00.07.02.3 574bd6cff23d21b18d62db32375ceee1 ffb281db6a8347997de6f597eef1c8051097d99eb9507d6df2fb05814b92210e
RUT2M_R_00.07.02 31e46e8ae6ea458c2526848ba705664c 0a24067e4bb2182f4de068f2581649f7705bf4dda5520d8265270475ceb4af00
RUT2M_R_00.07.01.4 bceb73437f7b96ca39b1617502f2eecf b9c0d2fedb8b9b23430a19e453bbd24e66dd2c81c9fa02a834fbd707c7860db5
RUT2M_R_00.07.01.3 acc638116c5986f6906d794c49481833 743282f41d3bcbb4bf5a87803f78100c3ffbb151d43fdefc1788011489a314b5
RUT2M_R_00.07.01.2 734c77671933eded76ca6656aad37eca b8044d734d7d4e715c50fd196de1cff28ddd4ea438f310030f1950ab09af98c8