RT-AC3200
BIOS & FIRMWARE
- Driver & Tools
- BIOS & FIRMWARE
1. Added more security measures to block Cyclops blinks.
2. Fixed Stored XSS vulnerability.
3. Fixed httpd vulnerability
4. Fixed stack overflow vulnerability
5. Fixed DoS vulnerability
6. Fixed CVE-2021-41435, CVE-2021-41436.
7. Fixed information disclosure vulnerability.
8. Fixed string format stacks vulnerability
9. Fixed SQL injection vulnerability
10. Fixed json file traversal vulnerability
11. Fixed plc/port file traversal vulnerability
Please unzip the firmware file first then check the MD5 code.
MD5: e531753a9cd508bd68904f236d12c249
1.Fixed the FragAttack vulnerability.
2.Fixed DoS vulnerability. Thanks for Tsinghua University NISL's contribution.
3.Improved system stability.
4.Fixed GUI bugs.
Please unzip the firmware file first then check the MD5 code.
MD5: 72136246879b0a83aa0703f34a887f44
Security Fixed:
Fixed CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687, CVE-2020-25684, CVE-2020-25685, CVE-2020-25686
Please be noted this is a quick fix beta version for DNSmasq vulnerabilities. Refer to "Method 2: Update Manually" in https://www.asus.com/support/FAQ/1008000 to update this firmware.
Please unzip the firmware file first then check the MD5 code.
MD5: cb212446b1543817edf85e523e74f118
- Fixed RCE vulnerability.
Please unzip the firmware file first then check the MD5 code.
MD5: 6393ccc27ca66f69f32570e870c2b782
Security update
- Fixed CVE-2020-12695 (CallStranger)
- Fixed Reflected XSS vulnerability.
- Fixed Directory traversal vulnerability.
- Fixed CVE-2017-15653.
The update server transport layer security was upgraded and the old protocol was removed.
If your router firmware version is lower than 3.0.0.4.382.52230, please refer to the "Update Manually" section in https://www.asus.com/support/FAQ/1008000 to update the firmware.
Please unzip the firmware file first then check the MD5 code.
MD5: ca43b2b06a9fc9cf98873ba92ab61e62
- Fixed null pointer issue.
- Fixed DDoS vulnerability.
- Fixed command injection vulnerability.
- Fixed buffer overflow vulnerability.
- Upgdated OTA function.
- Support router certificate export. After import the certificate to the computer you will not see the warning message when login with https.Please refer to https://www.asus.com/us/support/FAQ/1034294/
Please unzip the firmware file first and then check the MD5 code.
MD5: bee02c3a4d26f7b4856d57401c5cf4f5
- Fixed CVE-2019-15126 (Kr00k) vulnerability.
Please unzip the firmware file first then check the MD5 code.
MD5: 74ca3c8862843171ca783626cb9981ca
- Fixed Let's encrypt register issues.
- Fixed Network map client list issues.
- Fixed OpenVPN related bugs.
- Fixed schedule reboot bugs.
- Improved system stability.
- Fixed dual wan failover bugs while the primary wan type is L2TP
Please unzip the firmware file first then check the MD5 code.
MD5: 4ec565916cf70de991a8fac31f96ce2c
- Fix a DDoS vulnerability.
Please unzip the firmware file first then check the MD5 code.
MD5: 317ece78a9734d5451e3f490970056fa
- Fixed firmware update notification bugs.
- Fixed dual wan user interface bugs.
Please unzip the firmware file first then check the MD5 code.
MD5: 9a0be2b262a3c70a9b3858fc3962182f
- Fixed 5GHz auto channel selection problem.
Please unzip the firmware file first then check the MD5 code.
MD5: 9fc6af17208414e7d820a27286ed27f5
Security Fix
- Fixed DDoS vulnerability.
- Fixed AiCloud vulnerability. Thanks for Matt Cundari's contribution.
- Fixed command injection vulnerability. Thanks for S1mba Lu's contribution.
- Fixed buffer overflow vulnerability. Thanks for Javier Aguinaga's contribution.
- Fixed CVE-2018-20334
- Fixed CVE-2018-20336
- Fixed null pointer issue. Thanks for CodeBreaker of STARLabs’ contribution.
- Fixed AiCloud buffer overflow vulnerability. Thanks for Resecurity International's contribution.
Please unzip the firmware file first then check the MD5 code.
MD5: a1619b309840010ba4755cb426bf1598
Security fixes
- Fixed CVE-2018-14710, CVE-2018-14711, CVE-2018-14712, CVE-2018-14713, CVE-2018-14714. Thanks for Rick Ramgattie's contribution.
- Fixed AiCloud/ Samba account vulnerability. Thanks for Matthew Cundari's contribution.
- Fixed DoS vulnerability. Thanks for Ruikai Liu's contribution.
- Fixed CVE-2018-17020, CVE-2018-17021, CVE-2018-17022.
- Fixed stored XSS vulnerability. Thanks for Duda Przemyslaw's contribution.
- Updated OpenSSL library.
Please unzip the firmware file first then check the MD5 code.
MD5: 0e61897862453ba523243e3a7f4bb205
- Modified the EULA for DDNS, AiProtection, Adaptive QoS, Traffic Analyzer, Web history, Feedback.
- Added Privacy page in Advanced settings
- Fixed IPv6 bugs
- Modified USB 3.0 related strings.
- Added more protection mechanism for OpenVPN account.
Please unzip the firmware file first then check the MD5 code.
MD5: abf338d73547c9502c3fd20e1792486a
- Improved system stability.
- Fixed XSS vulnerability. Thanks to Yonghui Han of Fortinet's FortiGuard Labs.
- Fixed CVE-2018-8877, CVE-2018-8878, CVE-2018-8879
- Fixed plain text password vulnerability in lighthttpd
- Modified Quick Internet Setup wizard process.
- Main SSID and guest network can hide independently.
Please unzip the firmware file first then check the MD5 code.
MD5: ab9de584c990985abaef90659446a12c