RT-AX86S
BIOS & FIRMWARE
- Driver & Tools
- BIOS & FIRMWARE
Please unzip the firmware file, and then verify the checksum.
SHA256: 0cef39649a777d13c8f236d5df206a11d8b1951ba44fdaa988bafa1bf198df1e
1.Strengthened input validation and data processing workflows to further protect information security.
2.Enhanced AiCloud password protection mechanisms, safeguarding against unauthorized access attempts.
3.Enhanced device security through improved buffer handling in connection features.
4.Refined data handling processes, ensuring secure and accurate information management.
5.Enhanced file access control mechanisms, promoting a more secure operating environment.
6.Strengthened certificate protection, providing enhanced data security.
Security
- Fixed string format stacks vulnerability
- Fixed cross-site-scripting vulnerability
- Fixed informational vulnerability.
Thanks to Howard McGreehan.
-Fixed SQL injection vulnerability
-Fixed json file traversal vulnerability
-Fixed plc/port file traversal vulnerability
-Fixed stack overflow vulnerability
Thanks to HP of Cyber Kunlun Lab
-Fixed authenticated stored XSS vulnerability
Thanks to Luke Walker – SmartDCC
-Fixed LPD denial of service vulnerability
-Fixed cfgserver heap overflow vulnerability
-Fixed cfgserver denial of service vulnerability
Thanks to TianHe from BeFun Cyber Security Lab.
Added more ISP profile
Digi 1 - TM
Digi 2 - TIME
Digi 3 - Digi
Digi 4 - CTS
Digi 5 - ALLO
Digi 6 - SACOFA
Maxis - CTS
Maxis - SACOFA
Maxis - TNB/ALLO
Fixed AiMesh guest network issues.
Fixed DDNS issues where the WAN IP is IPv6
Fixed UI bugs in Administration --> feedback.
Fixed time zone error.
Improved the connection stability.
Supported v6plus
Please unzip the firmware file first then check the MD5 code.
MD5:9c8a9dcf6c72f84bdb5d7584b7113c44
1. Fixed Let's encrypt related bugs.
2. Fixed httpd vulnerability
3. Fixed stack overflow vulnerability
4. Fixed DoS vulnerability
Thanks for the contribution of Fans0n、le3d1ng、Mwen、daliy yang from 360 Future Security Labs
Please unzip the firmware file first then check the MD5 code.
MD5:8ac42fe109a287d63b17645c80b2506e