Changes

no edit summary
Line 8: Line 8:     
==Changelog==
 
==Changelog==
{{Template:Global_changelog_disclaimer}}
+
<!--NEW_FW-->
 +
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.8/TAP100/TAP100_R_00.07.08_WEBUI.bin TAP100_R_00.07.08]</span></b> | 2024.07.18===
 +
* <b>New</b>
 +
** <b>Network</b>
 +
*** 802.1X: added client support
 +
** <b>Services</b>
 +
*** Wifi Scanner: added support
 +
** <b>System</b>
 +
*** API Core: added option to configure api session timeout
 +
*** UI Core: added data analytics support
 +
*** Update Firmware: added warning message about device being temporarily unreachable on firmware update
 +
* <b>Improvements</b>
 +
** <b>Network</b>
 +
*** Wireless: added warning when user configures mesh on radio with automatic frequency channel
 +
*** Wireless: added support for wireless MAC-filter MAC ranges
 +
*** Wireless: changed Radius Accounting port is not required when configuring access point with enterprise encryption
 +
*** Wireless: refactored radio configuration page layout
 +
*** Wireless: refactored assignment of wireless interfaces MAC addresses, STA interface will always use fixed address
 +
** <b>Services</b>
 +
*** stunnel: updated version to 5.72
 +
** <b>System</b>
 +
*** Access Control: added certificate key length warnings
 +
*** Access Control: adjusted access control when all pages are blocked
 +
*** Access Control: added certificate file download for CLI to work on all browsers
 +
*** API Core: implemented functionality to include warning messages for vulnerable certificates
 +
*** RutOS: improved GPL example page to align with new software architecture
 +
*** Troubleshoot: added support for multiple syslog servers
 +
*** UI Core: added additional message with IP address to loading screen for scenarios when redirect to different IP address happens
 +
*** UI Core: added toast message hiding when text is too long
 +
*** Update Firmware: added 'Firmware version' data in screen after firmware upload
 +
*** WebUI: added functionality to cancel loading screen if it takes 30 or more seconds
 +
*** WebUI: removed all ubus method calls from webui
 +
*** WebUI: added password generator for first login modal
 +
*** WebUI: added sticky position to side menu
 +
*** WebUI: added default password hint to login error message
 +
*** WebUI: added warning messages for low-security certificates
 +
*** Kernel: updated version to 5.15.159
 +
*** libexpat: updated version to 2.6.2
 +
*** SSL/TLS: updated version to 3.0.14
 +
*** vue: updated version to 3.4
 +
* <b>Fix</b>
 +
** <b>Network</b>
 +
*** Network: fixed overriding MAC address for interfaces that are bridged
 +
*** Network: fixed missing default route when static mode is selected
 +
*** Network: fixed tapxxx.rutos.net DNS resolution
 +
*** Wireless: fixed wireless scan results sometimes not being returned
 +
*** Wireless: fixed API POST validation without sending "mode" option
 +
*** Wireless: removed the ability to have different countries in radio configurations
 +
*** Wireless: fixed interface delete when it's unassigned from the wireless interface in access point mode
 +
*** Wireless: fixed backticks for WiFi SSID are not allowed in WebUI
 +
** <b>System</b>
 +
*** Access Control: fixed download certificate button to be visible
 +
*** Administration: fixed repeated validation on cleared inputs and added validation when new password matches the old one
 +
*** API Core: fixed API method validation during upload action
 +
*** API Core: fixed error messages for POST method
 +
*** API Core: fixed option list validation
 +
*** Boot: fixed factory settings restore (firstboot) not deleting hidden files
 +
*** Events Log: fixed refresh button in event log table
 +
*** IP Block: fixed adding MAC addresses back to whitelist when unblocking all of them
 +
*** System Status: fixed wireless MAC address display value if radio is disabled
 +
*** Troubleshoot: fixed system log and kernel log buttons to be enabled with read only rights
 +
*** Update Firmware: fixed misleading "Firmware version" status of "N/A" to "FOTA service is disabled" when FOTA is disabled
 +
*** Update Firmware: fixed issue when infinite spinner appears after updating device firmware from server without having internet connection
 +
* <b>CVE Patches</b>
 +
** Patched CVE-2023-52425
 +
** Patched CVE-2023-52530
 +
** Patched CVE-2024-25629
 +
** Patched CVE-2024-28757
 +
----
 +
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.7.3/TAP100/TAP100_R_00.07.07.3_WEBUI.bin TAP100_R_00.07.07.3]</span></b> | 2024.06.25===
 +
* <b>Fix</b>
 +
** <b>Network</b>
 +
*** WebUI: fixed port advertisement change
 +
** <b>System</b>
 +
*** FOTA: fixed config when upgrading from older firmware with keep settings
 +
* <b>CVE Patches</b>
 +
** CVE-2024-31950
 +
** CVE-2024-31951
 +
----
 +
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.7.2/TAP100/TAP100_R_00.07.07.2_WEBUI.bin TAP100_R_00.07.07.2]</span></b> | 2024.06.12===
 +
* <b>Improvements</b>
 +
** <b>Services</b>
 +
*** Wireless: removed unnecessary information from system logs
 +
** <b>System</b>
 +
*** SSH: removed weak SSH algorithms
 +
* <b>Fix</b>
 +
** <b>System</b>
 +
*** IP Block: fixed blocking of UDP traffic
 +
*** Ledman: fixed WiFi LED indication when WiFi configuration is changed
 +
*** Uboot: fixed firmware recovery update via uboot on Windows
 +
* <b>CVE Patches</b>
 +
** CVE-2024-31948
 +
----
 +
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.7.1/TAP100/TAP100_R_00.07.07.1_WEBUI.bin TAP100_R_00.07.07.1]</span></b> | 2024.05.03===
 +
----
 +
* <b>New</b>
 +
** <b>System</b>
 +
*** WebUI: added the ability to generate random passwords for password input fields
 +
*** WebUI: added reset to “Factory defaults” option
 +
*** System: changed firmware certificate verification tool
 +
*** IP Block: added time-based login attempt blocking
 +
*** WebUI: added firmware update notification support
 +
*** Logging: added multiple remote syslog servers support
 +
* <b>Improvements</b>
 +
** <b>Services</b>
 +
*** WebUI: moved licenses to footer
 +
** <b>System</b>
 +
*** WebUI: adjusted responsive design breakpoints
 +
*** WebUI: added more strict password requirements for restoring backup
 +
*** WebUI: changed firmware update option to server as a default option
 +
*** WebUI: improved first login password change logic
 +
*** GPL: added offline package preparation command for GPL builds
 +
*** Kernel: updated to version 5.15.149
 +
*** Libcap: updated package version to 2.69
 +
* <b>Fix</b>
 +
** <b>System</b>
 +
*** WebUI: fixed an issue when a user was not logged out after changing profiles
 +
*** CLI: fixed enter key issue on mobile chromium based browsers
 +
* <b>CVE Patches</b>
 +
** CVE-2022-4603
 +
** CVE-2022-23308
 +
** CVE 2022-45061
 +
** CVE-2023-0466
 +
** CVE-2023-6129
 +
** CVE-2023-7042
 +
** CVE 2023-24329
 +
** CVE 2023-27043
 +
** CVE-2023-42366
 +
** CVE-2023-46218
 +
** CVE-2023-46219
 +
** CVE-2023-46752
 +
** CVE-2023-46753
 +
** CVE-2023-48795
 +
** CVE-2024-2397
 +
** CVE-2024-25062
 +
** CVE-2024-27913
 +
** CVE-2024-22365
 +
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.10/TAP100/TAP100_R_00.07.06.10_WEBUI.bin TAP100_R_00.07.06.10]</span></b> | 2024.04.04===
 
----
 
----
<!--NEW_FW-->
+
* Global changelog for <b>R_00.07.06.10</b> - [[Global RUTOS changelog#R_00.07.06.10|LINK]]
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.8/TAP100/TAP100_R_00.07.06.8_WEBUI.bin TAP100_R_00.07.06.8]</span></b> | 2024.03.25===
+
===<b>TAP100_R_00.07.06.8</b> | 2024.03.25===
 
----
 
----
* Global changelog for <b>R_00.07.06.8</b> - [[Global RUTOS changelog#R_00.07.06.8|LINK]]
+
* Firmware <b>R_00.07.06.8</b> was removed due to an issue with inefficient memory allocation for LED control.
 
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.6/TAP100/TAP100_R_00.07.06.6_WEBUI.bin TAP100_R_00.07.06.6]</span></b> | 2024.03.04===
 
===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.6/TAP100/TAP100_R_00.07.06.6_WEBUI.bin TAP100_R_00.07.06.6]</span></b> | 2024.03.04===
 
----
 
----
Line 138: Line 275:  
*** Patched CVE-2023-29469 vulnerability
 
*** Patched CVE-2023-29469 vulnerability
 
*** Patched CVE-2023-31490 vulnerability
 
*** Patched CVE-2023-31490 vulnerability
*** Patched CVE-2023-36369 vulnerability
+
*** Patched CVE-2021-36369 vulnerability
 
*** Patched CVE-2023-48174 vulnerability
 
*** Patched CVE-2023-48174 vulnerability
 
*** Fixed Events Log database rotation to prevent log partition space exhaustion
 
*** Fixed Events Log database rotation to prevent log partition space exhaustion

Navigation menu