Line 8: |
Line 8: |
| | | |
| ==Changelog== | | ==Changelog== |
− | {{Template:Global_changelog_disclaimer}}
| + | <!--NEW_FW--> |
| + | ===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.8/TAP100/TAP100_R_00.07.08_WEBUI.bin TAP100_R_00.07.08]</span></b> | 2024.07.18=== |
| + | * <b>New</b> |
| + | ** <b>Network</b> |
| + | *** 802.1X: added client support |
| + | ** <b>Services</b> |
| + | *** Wifi Scanner: added support |
| + | ** <b>System</b> |
| + | *** API Core: added option to configure api session timeout |
| + | *** UI Core: added data analytics support |
| + | *** Update Firmware: added warning message about device being temporarily unreachable on firmware update |
| + | * <b>Improvements</b> |
| + | ** <b>Network</b> |
| + | *** Wireless: added warning when user configures mesh on radio with automatic frequency channel |
| + | *** Wireless: added support for wireless MAC-filter MAC ranges |
| + | *** Wireless: changed Radius Accounting port is not required when configuring access point with enterprise encryption |
| + | *** Wireless: refactored radio configuration page layout |
| + | *** Wireless: refactored assignment of wireless interfaces MAC addresses, STA interface will always use fixed address |
| + | ** <b>Services</b> |
| + | *** stunnel: updated version to 5.72 |
| + | ** <b>System</b> |
| + | *** Access Control: added certificate key length warnings |
| + | *** Access Control: adjusted access control when all pages are blocked |
| + | *** Access Control: added certificate file download for CLI to work on all browsers |
| + | *** API Core: implemented functionality to include warning messages for vulnerable certificates |
| + | *** RutOS: improved GPL example page to align with new software architecture |
| + | *** Troubleshoot: added support for multiple syslog servers |
| + | *** UI Core: added additional message with IP address to loading screen for scenarios when redirect to different IP address happens |
| + | *** UI Core: added toast message hiding when text is too long |
| + | *** Update Firmware: added 'Firmware version' data in screen after firmware upload |
| + | *** WebUI: added functionality to cancel loading screen if it takes 30 or more seconds |
| + | *** WebUI: removed all ubus method calls from webui |
| + | *** WebUI: added password generator for first login modal |
| + | *** WebUI: added sticky position to side menu |
| + | *** WebUI: added default password hint to login error message |
| + | *** WebUI: added warning messages for low-security certificates |
| + | *** Kernel: updated version to 5.15.159 |
| + | *** libexpat: updated version to 2.6.2 |
| + | *** SSL/TLS: updated version to 3.0.14 |
| + | *** vue: updated version to 3.4 |
| + | * <b>Fix</b> |
| + | ** <b>Network</b> |
| + | *** Network: fixed overriding MAC address for interfaces that are bridged |
| + | *** Network: fixed missing default route when static mode is selected |
| + | *** Network: fixed tapxxx.rutos.net DNS resolution |
| + | *** Wireless: fixed wireless scan results sometimes not being returned |
| + | *** Wireless: fixed API POST validation without sending "mode" option |
| + | *** Wireless: removed the ability to have different countries in radio configurations |
| + | *** Wireless: fixed interface delete when it's unassigned from the wireless interface in access point mode |
| + | *** Wireless: fixed backticks for WiFi SSID are not allowed in WebUI |
| + | ** <b>System</b> |
| + | *** Access Control: fixed download certificate button to be visible |
| + | *** Administration: fixed repeated validation on cleared inputs and added validation when new password matches the old one |
| + | *** API Core: fixed API method validation during upload action |
| + | *** API Core: fixed error messages for POST method |
| + | *** API Core: fixed option list validation |
| + | *** Boot: fixed factory settings restore (firstboot) not deleting hidden files |
| + | *** Events Log: fixed refresh button in event log table |
| + | *** IP Block: fixed adding MAC addresses back to whitelist when unblocking all of them |
| + | *** System Status: fixed wireless MAC address display value if radio is disabled |
| + | *** Troubleshoot: fixed system log and kernel log buttons to be enabled with read only rights |
| + | *** Update Firmware: fixed misleading "Firmware version" status of "N/A" to "FOTA service is disabled" when FOTA is disabled |
| + | *** Update Firmware: fixed issue when infinite spinner appears after updating device firmware from server without having internet connection |
| + | * <b>CVE Patches</b> |
| + | ** Patched CVE-2023-52425 |
| + | ** Patched CVE-2023-52530 |
| + | ** Patched CVE-2024-25629 |
| + | ** Patched CVE-2024-28757 |
| + | ---- |
| + | ===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.7.3/TAP100/TAP100_R_00.07.07.3_WEBUI.bin TAP100_R_00.07.07.3]</span></b> | 2024.06.25=== |
| + | * <b>Fix</b> |
| + | ** <b>Network</b> |
| + | *** WebUI: fixed port advertisement change |
| + | ** <b>System</b> |
| + | *** FOTA: fixed config when upgrading from older firmware with keep settings |
| + | * <b>CVE Patches</b> |
| + | ** CVE-2024-31950 |
| + | ** CVE-2024-31951 |
| ---- | | ---- |
− | <!--NEW_FW--> | + | ===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.7.2/TAP100/TAP100_R_00.07.07.2_WEBUI.bin TAP100_R_00.07.07.2]</span></b> | 2024.06.12=== |
| + | * <b>Improvements</b> |
| + | ** <b>Services</b> |
| + | *** Wireless: removed unnecessary information from system logs |
| + | ** <b>System</b> |
| + | *** SSH: removed weak SSH algorithms |
| + | * <b>Fix</b> |
| + | ** <b>System</b> |
| + | *** IP Block: fixed blocking of UDP traffic |
| + | *** Ledman: fixed WiFi LED indication when WiFi configuration is changed |
| + | *** Uboot: fixed firmware recovery update via uboot on Windows |
| + | * <b>CVE Patches</b> |
| + | ** CVE-2024-31948 |
| + | ---- |
| + | ===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.7.1/TAP100/TAP100_R_00.07.07.1_WEBUI.bin TAP100_R_00.07.07.1]</span></b> | 2024.05.03=== |
| + | ---- |
| + | * <b>New</b> |
| + | ** <b>System</b> |
| + | *** WebUI: added the ability to generate random passwords for password input fields |
| + | *** WebUI: added reset to “Factory defaults” option |
| + | *** System: changed firmware certificate verification tool |
| + | *** IP Block: added time-based login attempt blocking |
| + | *** WebUI: added firmware update notification support |
| + | *** Logging: added multiple remote syslog servers support |
| + | * <b>Improvements</b> |
| + | ** <b>Services</b> |
| + | *** WebUI: moved licenses to footer |
| + | ** <b>System</b> |
| + | *** WebUI: adjusted responsive design breakpoints |
| + | *** WebUI: added more strict password requirements for restoring backup |
| + | *** WebUI: changed firmware update option to server as a default option |
| + | *** WebUI: improved first login password change logic |
| + | *** GPL: added offline package preparation command for GPL builds |
| + | *** Kernel: updated to version 5.15.149 |
| + | *** Libcap: updated package version to 2.69 |
| + | * <b>Fix</b> |
| + | ** <b>System</b> |
| + | *** WebUI: fixed an issue when a user was not logged out after changing profiles |
| + | *** CLI: fixed enter key issue on mobile chromium based browsers |
| + | * <b>CVE Patches</b> |
| + | ** CVE-2022-4603 |
| + | ** CVE-2022-23308 |
| + | ** CVE 2022-45061 |
| + | ** CVE-2023-0466 |
| + | ** CVE-2023-6129 |
| + | ** CVE-2023-7042 |
| + | ** CVE 2023-24329 |
| + | ** CVE 2023-27043 |
| + | ** CVE-2023-42366 |
| + | ** CVE-2023-46218 |
| + | ** CVE-2023-46219 |
| + | ** CVE-2023-46752 |
| + | ** CVE-2023-46753 |
| + | ** CVE-2023-48795 |
| + | ** CVE-2024-2397 |
| + | ** CVE-2024-25062 |
| + | ** CVE-2024-27913 |
| + | ** CVE-2024-22365 |
| ===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.10/TAP100/TAP100_R_00.07.06.10_WEBUI.bin TAP100_R_00.07.06.10]</span></b> | 2024.04.04=== | | ===<b><span class="plainlinks">[https://firmware.teltonika-networks.com/7.6.10/TAP100/TAP100_R_00.07.06.10_WEBUI.bin TAP100_R_00.07.06.10]</span></b> | 2024.04.04=== |
| ---- | | ---- |
Line 141: |
Line 275: |
| *** Patched CVE-2023-29469 vulnerability | | *** Patched CVE-2023-29469 vulnerability |
| *** Patched CVE-2023-31490 vulnerability | | *** Patched CVE-2023-31490 vulnerability |
− | *** Patched CVE-2023-36369 vulnerability | + | *** Patched CVE-2021-36369 vulnerability |
| *** Patched CVE-2023-48174 vulnerability | | *** Patched CVE-2023-48174 vulnerability |
| *** Fixed Events Log database rotation to prevent log partition space exhaustion | | *** Fixed Events Log database rotation to prevent log partition space exhaustion |