TAP200 Firmware Downloads

From Teltonika Networks Wiki
Main Page > TAP Access Points > TAP200 > TAP200 Firmware Downloads

This page contains firmware files for TAP200 devices. Look to the table below or the changelog to find download links.

To upgrade firmware using WebUI, follow the instructions in TAP200 Firmware.

TAP200

File Type Release date Size MD5 Changelog
TAP200_R_00.07.15_WEBUI.bin Latest FW 2025.06.06 11 MB f0db0bfc4c2099e253df32ad7ce6f320 Link
TAP200_R_00.07.13.4_WEBUI.bin Mass production FW 2025.04.04 10.13 MB 785d888f25b59467bceadd2183687991 Link
TAP200_R_GPL_00.07.15.tar.gz SDK 2025.06.06 28 MB 6e2ea4eb37257237125929088c80d2ef



FW checksums


Checksums for firmware files can be found here.

Changelog

TAP200_R_00.07.15 | 2025.06.06

  • New
    • System
      • WebUI: added default HTTP redirect to HTTPS
  • Improvements
    • Network
      • Wireless: simplified radio transmit power selection
      • Wireless: added status for current radio transmit power
      • iw: updated version to 6.9
      • mac80211: updated version to 6.12.6
      • mt76: updated version to 2025-01-22
    • Services
      • ovpn-dco: updated version to 0.2.20241216
    • System
      • API Core: added preflight OPTIONS method support
      • Troubleshoot: separated troubleshooting into individual configuration tabs
      • Troubleshoot: improved logging size configuration and log size limits
      • WebUI: reduced size of the navigation menu and some form elements
      • WebUI: updated table selected rows actions design
      • WebUI: added HTTPS certificate expiration warning and renew functionality
      • WebUI: unified styles of first login and renew expired password modals
      • WebUI: updated Japanese translations
      • Linux: updated version to 6.6.87
  • Fix
    • Network
      • 802.1X Client: fixed warning message of different port configurations sometimes appearing when closing modal
      • 802.1X Client: fixed 802.1X (client) page access not being controlled by the "Network > Ports" entry
      • Network: fixed incorrect network type shown for LAN with only WiFi interface
      • Wireless: fixed trailing whitespace being ignored in SSID or password
      • Wireless: fixed enterprise client configuration not showing all certificates and keys generated with SCEP
      • Wireless: fixed enterprise client configuration requiring password for unencrypted certificate key
      • Wireless: fixed an error when radio (5GHz or 2GHz) gets duplicated on default interfaces (Wireless SSIDs) or some custom interfaces
    • Services
      • RMS: fixed 'Next connection after' timer display
      • RMS: fixed transition from 'Standby' to 'Enabled' mode
    • System
      • Access Control: fixed HTTPS certificates validation to not allow RSA key length less than 1024 bits and ECC key length less than 160 bits
      • API Core: fixed session validation issues
      • System Status: removed bootloader version information if it does not exist
      • WebUI: fixed inconsistent spacing between page elements
      • WebUI: fixed warnings still being displayed after removing uploaded certificates
      • WebUI: fixed issues with SDK API path recognition

TAP200_R_00.07.14.3 | 2025.05.26

  • Fix
    • System
      • Custom Scripts: fixed execution of custom scripts after upgrade

TAP200_R_00.07.14.2 | 2025.05.09

Note: If a system upgrade with keep settings is performed from R_00.07.14 or R_00.07.14.1 to this version, follow the instructions described under those firmware versions below to resolve Data Limit and traffic monitoring issues.


  • Fix
    • Network
      • Network: fixed data limit database save when upgrading with keep settings
      • Network: fixed Management VLAN input
      • Wireless: fixed VLAN ID input

TAP200_R_00.07.14.1 | 2025.05.06

Note: This firmware version has been withdrawn due to a critical issue affecting the Data Limit, traffic monitoring functionalities.

Note: If a system upgrade with keep settings was already performed from R_00.07.14 to this version, previous Data Limit tracking and traffic monitoring information cannot be restored. However, to keep current traffic monitoring history after next update, the command found in the Note below must be executed in CLI.

Note: If a system upgrade with keep settings is performed from this firmware version to newer and R_00.07.14 was never used, following command must be executed in CLI before upgrade to resolve Data Limit and traffic monitoring issues.

mkdir -p /usr/local/lib/upgrade/keep.d && echo /usr/local/usr/lib/mdcollectd/mdcollectd.db_new.gz > /usr/local/lib/upgrade/keep.d/mdcollect

  • Fix
    • System
      • RutOS: fixed curl compilation in SDK
  • CVE Patches
    • CVE-2025-2704

TAP200_R_00.07.14 | 2025.04.24

Note: This firmware version has been withdrawn due to a critical issue affecting the Data Limit, traffic monitoring functionalities.

Note: If a system upgrade with keep settings is performed from this firmware version to newer, following command must be executed in CLI before upgrade to resolve Data Limit and traffic monitoring issues.

mkdir -p /usr/local/lib/upgrade/keep.d && echo /usr/local/usr/lib/mdcollectd/mdcollectd.db_new.gz > /usr/local/lib/upgrade/keep.d/mdcollect

  • New
    • Services
      • OpenVPN: added OpenVPN service support
    • System
      • RutOS: enabled a read-only root filesystem to ensure system integrity and security
  • Improvements
    • Network
      • Wireless: added warning to a radio channel option when client is configured on same radio indicating that this option can be ignored
      • Wireless: added WiFi standard used by the connected client
      • Curl: updated version to 8.12.0
      • wireless-regdb: updated version to 2024.10.07
    • System
      • Events Log: added events log file export
      • Profiles: improved table data UI
      • WebUI: removed default password icons on "Internet Explorer" and "Microsoft Edge" browsers
      • Kernel: updated version to 5.10.234
      • Time Zone Database: updated version to 2025a
  • Fix
    • Network
      • Wireless: fixed hover hint always being shown on delete button
    • Services
      • RMS: fixed serial code copy button not being displayed
    • System
      • API Core: fixed file upload issue which sometimes made WebUI unresponsive
      • NTP: fixed time servers limit validation
      • Password Policy: fixed special characters validation
      • Profiles: fixed loading screen reappearing after profile change fails
      • WebUI: fixed enabled button being removed in some cards on medium sized screens
  • CVE Patches
    • CVE-2022-42721
    • CVE-2023-7104
    • CVE-2023-31489
    • CVE-2024-9143
    • CVE-2024-13176

TAP200_R_00.07.13.4 | 2025.04.04

  • Improvements
    • System
      • RutOS: updated libubox
  • Fix
    • System
      • RutOS: fixed occasional ubus page fault after package install
      • RutOS: fixed user group duplicate entries after applying backup

TAP200_R_00.07.13.3 | 2025.03.21

  • Fix
    • Services
      • RMS: fixed connection retry interval count

TAP200_R_00.07.13.2 | 2025.03.18

  • Fix
    • Network
      • 802.1X Client: fixed 802.1x client not working when upgrading from an older firmware

TAP200_R_00.07.13.1 | 2025.03.06

  • Fix
    • System
      • Auto Reboot: fixed an issue causing the device to reboot immediately

TAP200_R_00.07.13 | 2025.03.03

Note: This firmware was removed due an issue with Auto Reboot functionality performing unnecessary device reboot.

  • New
    • System
      • Update Firmware: added link to FW & SDK download page
  • Improvements
    • Network
      • Wireless: added rotating log files for wireless services
      • iperf3: updated version to 3.17.1
    • System
      • Access Control: improved UX when disabling HTTP and HTTPS local access settings
      • Administration: added confirmation prompt when changing profiles
      • Administration: updated hostname validation to allow numeric-only hostname
      • Security: changed password policy to require at least one special character
      • Update Firmware: added link to changelog page
      • WebUI: removed basic/advanced mode
      • WebUI: updated Teltonika logo
      • Kernel: updated version to 5.10.233
  • Fix
    • Network
      • Network: fixed API failing to sort specific network interface configurations
      • Network: fixed VLAN management hijacking the wireless network under certain conditions
      • Network: fixed forwarding DNS queries through wrong VLAN
      • Wireless: fixed new network edit not opening after network with same name deleted
      • Wireless: fixed WiFi services setup failures with AP+STA configuration on 2.4 GHz and 5 GHz radios simultaneously
      • Wireless: fixed automatic channel selection failing in Japan regulatory domain
      • Wireless: fixed memory leak in wireless service caused by AP configuration reloads
      • Wireless: fixed inaccurate Hotspot error when saving SSIDs page
    • Services
      • RMS: fixed the "Connection state" status displayed as JSON when device language was set to anything other than English
      • RMS: fixed the display of connected Hotspot clients when the radios of the Hotspot interface are modified
    • System
      • Access Control: fixed "redirect_https" option reset after device reboot
      • Access Control: fixed default HTTPS CA certificate generation
      • Date & Time: fixed time synchronization with the browser when using Europe/Kyiv timezone
      • Update Firmware: fixed unnecessary FOTA requests when FOTA is disabled
  • CVE Patches
    • CVE-2022-49043
    • CVE-2024-5290
    • CVE-2024-9287
    • CVE-2024-11053
    • CVE-2024-34459
    • CVE-2024-53580
    • CVE-2024-56171
    • CVE-2025-24928
    • CVE-2025-27113

TAP200_R_00.07.12.3 | 2025.02.14

  • Firmware includes no changes for this device

TAP200_R_00.07.12 | 2025.01.20

  • Improvements
    • Network
      • Wireless: sorted scan results by signal strength by default
      • Wireless: renamed password field in join modal to be called same as in edit modal
      • Curl: updated version to 8.11.0
    • System
      • API Core: added query parameter for configuration GET endpoints to receive all options, even if unset
      • Kernel: updated version to 5.10.229
  • Fix
    • Network
      • Wireless: fixed displayed client status when WPA supplicant does not have status
      • Wireless: fixed transmit power getting adjusted incorrectly when changing regulatory country
      • Wireless: fixed API "htmode" option format validation
      • Wireless: fixed API allowing empty "country" value
    • Services
      • NTP Client: fixed Count of time synchronizations that was not working properly
      • Wifi Scanner: fixed service not working when initially Wireless radio is disabled
    • System
      • WebUI: fixed SDK example app validation mismatch between UI and API
  • CVE Patches
    • CVE-2024-5594
    • CVE-2024-9681
    • CVE-2024-29195

TAP200_R_00.07.11.1 | 2024.12.02

  • Fix
    • Services
      • Ledman: fixed issue when network type LEDs are blinking when data connection is established

TAP200_R_00.07.11 | 2024.11.25

  • New
    • Network
      • Network: added fallback IP option to DHCP mode
    • Services
      • Wireguard: added QR code configuration generator
    • System
      • Administration: added capability of displaying a configurable banner before login
      • Password Policy: added ability to modify the password policy
      • System Users: added sensitive option toggle for user groups
  • Improvements
    • Network
      • Wireless: changed radio status to show channel frequency in MHz instead of GHz
    • System
      • Access Control: added ability to bind HTTP and HTTPS to specific IPs and ports
      • Events Log: improved event log messages format
      • Logging: added a log ID to each log entry for easier tracking and identification
      • WebUI: updated design of tables
      • Kernel: updated version to 5.10.226
      • libffi: updated version to 3.4.6
      • readline: updated version to 8.2
  • Fix
    • Network
      • Network: changed default mode to DHCP with fallback IP to prevent problems with incorrect subnet routing
      • Wireless: fixed wireless not being reloaded after its interface's physical device was changed
    • System
      • Access Control: fixed unauthorized errors on interface endpoints
      • Access Control: fixed IP Block configuration when upgrading from previous firmware versions
      • WebUI: fixed issue when sometimes hidden sections with created instances were not displayed
  • CVE Patches
    • CVE-2021-38291
    • CVE-2024-6232
    • CVE-2024-44070

TAP200_R_00.07.10.2 | 2024.11.04

  • Firmware includes no changes for this device

TAP200_R_00.07.10 | 2024.10.10

  • New
    • Services
      • RMS: added SOCKS5 proxy support
  • Improvements
    • Network
      • Curl: added unix socket support
      • Network: improved performance under stateless single-directional traffic (RFC2544)
      • Wireless: added interface status message when DFS CAC is in progress
    • System
      • Access Control: refactored 'General', 'Security' web pages
      • Auto Reboot: added support for multiple hosts/URLs in Ping/Wget Reboot
      • Backup: encrypting backup does not require 7zip package anymore
      • WebUI: added ability to open new page in new tab without entering user credentials
      • WebUI: improved SDK example application
      • Glib2: updated version to 2.80.5
      • Kernel: updated version to 5.10.224
      • Ncurses: updated version to 6.5
  • Fix
    • Network
      • Wireless: fixed showing incorrect transmit power
      • Wireless: fixed hostapd ubus call timeout after wireless configuration change
    • Services
      • Ledman: fixed issue when power LED turns off when rebooting device
    • System
      • CLI: fixed some private IPs being incorrectly determined as public
      • JSON-RPC: fixed login "Access Denied" error
      • WebUI: fixed 'Memory' status card progress bars visuals
      • WebUI: fixed search bar suggestions after removing packages
      • WebUI: fixed custom SDK pages not loading correctly
  • CVE Patches
    • CVE-2021-3520
    • CVE-2021-44540
    • CVE-2021-44541
    • CVE-2024-4032
    • CVE-2024-6119
    • CVE-2024-6232
    • CVE-2024-6923
    • CVE-2024-7264
    • CVE-2024-42225

TAP200_R_00.07.09.4 | 2024.10.02

  • Improvements
    • Services
      • NTP Client: changed default NTP servers
  • Fix
    • Services
      • NTP Client: fixed NTP server usage to work with next in line server if current server does not respond

TAP200_R_00.07.09.3 | 2024.09.27

  • Firmware includes no changes for this device

TAP200_R_00.07.09.1 | 2024.09.13

  • Improvements
    • Services
      • Python3: updated version to 3.11.7

TAP200_R_00.07.09 | 2024.09.03

  • New
    • Network
      • Wireless: added option to enable 802.11w Management frame protection when using non-WPA3 encryption
    • System
      • WebUI: added notifications menu
  • Improvements
    • Network
      • Wireless: increased EAP authentication logging
      • Wireless: added insecure configuration warnings when configuring SSIDs
      • Wireless: updated wireless cards to display each radio device's signal quality and band data
      • Wireless: reduced time required for Fast Transition in STA mode
    • System
      • Access Control: improved system user's access control rules logic
      • Access Control: added option to disable password auth for the root user
      • Backup: improved backup page by splitting it into backup and reset settings page
      • Update Firmware: changed firmware update log to include firmware version
      • WebUI: updated firmware and backup verification pages design
      • WebUI: improved global alerts display
      • WebUI: adjusted overview page layout design
      • Kernel: updated version to 5.10.221
  • Fix
    • Network
      • Wireless: fixed wireless status API response to contain separate interface information for multiple radio configurations
    • System
      • API Core: fixed file deletion
      • Troubleshoot: fixed troubleshoot not including all the log files when log to flash is enabled
      • User Settings: fixed page to show groups and users if the user has been granted access
      • WebUI: fixed overview page to display active wireless (WLAN) clients
  • CVE Patches
    • CVE-2021-32292
    • CVE-2022-40617
    • CVE-2023-49441
    • CVE-2024-0397
    • CVE-2024-3596
    • CVE-2024-5535
    • CVE-2024-8088
    • CVE-2024-26669
    • CVE-2024-26739
    • CVE-2024-26740
    • CVE-2024-36901

TAP200_R_00.07.08.2 | 2024.08.12

  • Fix
    • System
      • Update Firmware: fixed inconsistent firmware download from FOTA

TAP200_R_00.07.08.1 | 2024.08.06

Note: This firmware version was removed due to an issue with FOTA firmware download.

  • Fix
    • Network
      • Network: fixed default route not being added for PPPoE connections
    • System
      • WebUI: fixed SDK WebUI package compilation

TAP200_R_00.07.08 | 2024.07.18

Note: This firmware version was removed due to an issue with FOTA firmware download.

  • New
    • Network
      • 802.1X: added client support
    • Services
      • Wifi Scanner: added support
    • System
      • API Core: added option to configure api session timeout
      • UI Core: added data analytics support
      • Update Firmware: added warning message about device being temporarily unreachable on firmware update
  • Improvements
    • Network
      • Wireless: added warning when user configures mesh on radio with automatic frequency channel
      • Wireless: added support for wireless MAC-filter MAC ranges
      • Wireless: changed Radius Accounting port is not required when configuring access point with enterprise encryption
      • Wireless: enabled ACS(automatic channel selection) for 5 GHz radios by default
      • Wireless: refactored radio configuration page layout
      • Wireless: refactored assignment of wireless interfaces MAC addresses, STA interface will always use fixed address
    • Services
      • stunnel: updated version to 5.72
    • System
      • Access Control: added certificate key length warnings
      • Access Control: adjusted access control when all pages are blocked
      • Access Control: added certificate file download for CLI to work on all browsers
      • API Core: implemented functionality to include warning messages for vulnerable certificates
      • Boot: enabled HW watchdog in bootloader
      • RutOS: improved GPL example page to align with new software architecture
      • Troubleshoot: added support for multiple syslog servers
      • UI Core: added additional message with IP address to loading screen for scenarios when redirect to different IP address happens
      • UI Core: added toast message hiding when text is too long
      • Update Firmware: added 'Firmware version' data in screen after firmware upload
      • WebUI: added functionality to cancel loading screen if it takes 30 or more seconds
      • WebUI: removed all ubus method calls from webui
      • WebUI: added password generator for first login modal
      • WebUI: added sticky position to side menu
      • WebUI: added default password hint to login error message
      • WebUI: added warning messages for low-security certificates
      • Kernel: updated version to 5.10.217
      • libexpat: updated version to 2.6.2
      • SSL/TLS: updated version to 3.0.14
      • vue: updated version to 3.4
  • Fix
    • Network
      • Network: fixed overriding MAC address for interfaces that are bridged
      • Network: fixed missing default route when static mode is selected
      • Network: fixed tapxxx.rutos.net DNS resolution
      • Wireless: fixed wireless scan results sometimes not being returned
      • Wireless: fixed 5 GHz Wi-Fi scanning is prohibited when a DFS channel and ETSI regulatory domain is selected
      • Wireless: fixed Wi-Fi 5 GHz unsupported channel selection issue on specific widths
      • Wireless: fixed API POST validation without sending "mode" option
      • Wireless: removed the ability to have different countries in radio configurations
      • Wireless: fixed interface delete when it's unassigned from the wireless interface in access point mode
      • Wireless: fixed backticks for WiFi SSID are not allowed in WebUI
    • System
      • Access Control: fixed download certificate button to be visible
      • Administration: fixed repeated validation on cleared inputs and added validation when new password matches the old one
      • API Core: fixed API method validation during upload action
      • API Core: fixed error messages for POST method
      • API Core: fixed option list validation
      • Boot: fixed factory settings restore (firstboot) not deleting hidden files
      • Events Log: fixed refresh button in event log table
      • IP Block: fixed adding MAC addresses back to whitelist when unblocking all of them
      • System Status: fixed wireless MAC address display value if radio is disabled
      • Troubleshoot: fixed system log and kernel log buttons to be enabled with read only rights
      • Update Firmware: fixed misleading "Firmware version" status of "N/A" to "FOTA service is disabled" when FOTA is disabled
      • Update Firmware: fixed issue when infinite spinner appears after updating device firmware from server without having internet connection
  • CVE Patches
    • Patched CVE-2023-52425
    • Patched CVE-2023-52530
    • Patched CVE-2024-25629
    • Patched CVE-2024-28757

TAP200_R_00.07.07.3 | 2024.06.25

  • Fix
    • Network
      • WebUI: fixed port advertisement change
    • System
      • FOTA: fixed config when upgrading from older firmware with keep settings
  • CVE Patches
    • CVE-2024-31950
    • CVE-2024-31951

TAP200_R_00.07.07.2 | 2024.06.12

  • Improvements
    • Services
      • Wireless: removed unnecessary information from system logs
    • System
      • SSH: removed weak SSH algorithms
  • Fix
    • System
      • IP Block: fixed blocking of UDP traffic
      • Ledman: fixed WiFi LED indication when WiFi configuration is changed
  • CVE Patches
    • CVE-2024-31948

TAP200_R_00.07.07.1 | 2024.05.03


  • New
    • Network
      • Wireless: added mesh support
    • System
      • WebUI: added the ability to generate random passwords for password input fields
      • WebUI: added reset to “Factory defaults” option
      • System: changed firmware certificate verification tool
      • IP Block: added time-based login attempt blocking
      • WebUI: added firmware update notification support
      • Logging: added multiple remote syslog servers support
  • Improvements
    • Services
      • WebUI: moved licenses to footer
    • System
      • WebUI: adjusted responsive design breakpoints
      • WebUI: added more strict password requirements for restoring backup
      • WebUI: changed firmware update option to server as a default option
      • WebUI: improved first login password change logic
      • GPL: added offline package preparation command for GPL builds
      • Kernel: updated version to 5.10.210
      • Libcap: updated package version to 2.69
  • Fix
    • System
      • WebUI: fixed an issue when a user was not logged out after changing profiles
      • CLI: fixed enter key issue on mobile chromium based browsers
  • CVE Patches
    • CVE-2022-4603
    • CVE-2022-23308
    • CVE 2022-45061
    • CVE-2023-0466
    • CVE-2023-6129
    • CVE-2023-7042
    • CVE 2023-24329
    • CVE 2023-27043
    • CVE-2023-31083
    • CVE-2023-42366
    • CVE-2023-46218
    • CVE-2023-46219
    • CVE-2023-46752
    • CVE-2023-46753
    • CVE-2023-48795
    • CVE-2024-2397
    • CVE-2024-25062
    • CVE-2024-27913
    • CVE-2024-22365

TAP200_R_00.07.06.10 | 2024.04.04

  • Fix
    • System
      • Ledman: fixed memory leak

TAP200_R_00.07.06.8 | 2024.03.25

  • Firmware R_00.07.06.8 was removed due to an issue with inefficient memory allocation for LED control.

TAP200_R_00.07.06.6 | 2024.03.04

  • New
    • System
      • Minified *.svg WebUI files to save space on the device
  • Fix
    • Network
      • Fixed the issue with Wireless bgscan functionality not operating correctly

TAP200_R_00.07.06.5 | 2024.02.21

  • Fix
    • System
      • Fixed year 2038 problem with time counter overflow

TAP200_R_00.07.06.3 | 2024.01.17

  • Fix
    • System
      • Patched CVE-2024-0193 vulnerability
      • Patched CVE-2023-51779 vulnerability
      • Updated OpenSSH to 9.6p1 version, fixed CVE-2023-51385 and CVE-2023-51384
      • Fixed profile migrations, added error handling when trying to change profile while it is still applying

TAP200_R_00.07.06.1 | 2024.01.04

  • Fix
    • Services
      • Fixed issue with NTPclient zombie processes

TAP200_R_00.07.06 | 2023.12.20

  • New
    • Network
      • Added 802.11v BSS Transition Management and 802.11k Radio Resource Measurement
    • WebUI
      • Renewed user interface design
      • Added network interface name change functionality
    • System
      • API support
  • Improvements
    • Network
      • Added two radio support on one SSID in Wireless
    • WebUI
      • Improved Events Log page loading by adding asynchronous pagination (pasikeitė puslapiavimo logika nei prieš tai buvusi)
      • Added auto redirect after changing router's IP address or port
      • Moved device menu entry “Reboot” to header menu
    • System
      • Updated hostapd version to 2023-09-08
      • Updated mt76 package version to 2022-12-22
      • Updated kernel version to 5.4.259
      • Added RMS data display to generated troubleshoot
      • Added process activity load list to generated troubleshoot
  • Fix
    • Network
      • Fixed ethernet link not working with some 100 Mbit switches
      • Fixed concurrent Wireless STA and AP functionality on 5 GHz band
    • Services
      • Added minimum free space check when saving logs to flash in Logging service
    • WebUI
      • Fixed side menu style issues when Japanese language is used
      • Fixed displaying of vendor names in Topology page
      • Fixed language packs being selectable when still in Package Manager queue
      • Fixed realtime graphs responsive design issues
      • Fixed wireless realtime data to show signal as unavailable with no connected clients
      • Fixed setup wizard errors in Wireless configuration page
    • System
      • Patched OpenSSL CVE-2023-3446
      • Patched OpenSSL CVE-2023-3817
      • Patched LibXML2 CVE-2023-39615
      • Patched LibXML2 CVE-2023-45322
      • Fixed running out of space when SSHFS is mounted in /tmp while generating troubleshoot

TAP200_R_00.07.05.5 | 2023.11.13

  • Fixes
    • Network
      • Fixed ethernet link not working with some 100Mbit switches

TAP200_R_00.07.05.4 | 2023.11.09

  • Improvements
    • WebUI
      • Improved asynchronous pagination in events log pages
      • Optimized Overview page load
      • Added resource loading cancellation after switching to different page

TAP200_R_00.07.05.1 | 2023.10.26

  • New
    • Initial firmware release