BIOS & FIRMWARE
- Driver & Tools
- BIOS & FIRMWARE
1.Fixed the FragAttack vulnerability.
2.Fixed DoS vulnerability. Thanks for Tsinghua University NISL's contribution.
3.Improved system stability.
4.Fixed GUI bugs.
Please unzip the firmware file first then check the MD5 code.
MD5: daa394b90c87ce1074ed088b01be8207
- Fixed Let's Encrypt issues
- Security Fixed:
Fixed CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687, CVE-2020-25684, CVE-2020-25685, CVE-2020-25686
Please be noted this is a quick fix beta version for DNSmasq vulnerabilities. Refer to "Method 2: Update Manually" in https://www.asus.com/support/FAQ/1008000 to update this firmware.
Please unzip the firmware file first then check the MD5 code.
MD5: 39bfbb51d42137bcfd76ed6ee8fe2761
Security update
- Fixed CVE-2020-12695 (CallStranger)
- Fixed Reflected XSS vulnerability.
- Fixed Directory traversal vulnerability.
- Fixed CVE-2017-15653.
The update server transport layer security was upgraded and the old protocol was removed.
If your router firmware version is lower than 3.0.0.4.382.52230, please refer to the "Update Manually" section in https://www.asus.com/support/FAQ/1008000 to update the firmware.
Please unzip the firmware file first then check the MD5 code.
MD5: 8f79df26a9190f6715d2f47de5388df3
- Fixed CVE-2019-15126 (Kr00k) vulnerability.
- Fixed some UI bugs.
- Support router certificate export. After import the certificate to the computer you will not see the warning message when login with https.Please refer to https://www.asus.com/us/support/FAQ/1034294/
Please unzip the firmware file first and then check the MD5 code.
MD5: 6aa2c670b65ab9c872cbf9c3593904a7
- Fixed Let's encrypt register issues.
- Fixed Network map client list issues.
- Fixed OpenVPN related bugs.
- Fixed schedule reboot bugs.
- Improved system stability.
- Fixed dual wan failover bugs while the primary wan type is L2TP.
Please unzip the firmware file first then check the MD5 code.
MD5: 8c276977dfef51cd7b671fa3e4ff1230
- Fix a DDoS vulnerability.
Please unzip the firmware file first then check the MD5 code.
MD5: eaea330e6727c72d5982f71ded71e2a6
- Fixed firmware update notification bugs.
- Fixed dual wan user interface bugs.
Please unzip the firmware file first then check the MD5 code.
MD5: 6f4b101c884fe779548fe9acc3608eec
Security Fix
- Fixed DDoS vulnerability.
- Fixed AiCloud vulnerability. Thanks for Matt Cundari's contribution.
- Fixed command injection vulnerability. Thanks for S1mba Lu's contribution.
- Fixed buffer overflow vulnerability. Thanks for Javier Aguinaga's contribution.
- Fixed CVE-2018-20334
- Fixed CVE-2018-20336
- Fixed null pointer issue. Thanks for CodeBreaker of STARLabs’ contribution.
- Fixed AiCloud buffer overflow vulnerability. Thanks for Resecurity International's contribution.
Please unzip the firmware file first then check the MD5 code.
MD5: 53a309a4eb1d958aa25960e0c0039278
- Improved system stability.
- Fixed XSS vulnerability. Thanks to Yonghui Han of Fortinet's FortiGuard Labs.
- Fixed CVE-2018-8877, CVE-2018-8878, CVE-2018-8879
- Fixed plain text password vulnerability in lighthttpd
- Modified Quick Internet Setup wizard process.
- Main SSID and guest network can hide independently.
- Suport multi-langue(UTF-8) network name
- Modified the EULA for DDNS, AiProtection, Adaptive QoS, Traffic Analyzer, Web history, Feedback.
- Added Privacy page in Advanced settings
- Fixed IPv6 bugs
- Modified USB 3.0 related strings.
- Added more protection mechanism for OpenVPN account.
- Limited Web&Apps filter number to 16
* Windows XP and Windows 7 do not support UTF-8 format SSID. These two
OS may see gibberish if using multi-language SSID.
Please unzip the firmware file first then check the MD5 code.
MD5: 73e49de69339502a8e98fa42da8da16c
Security fixed
-Fixed KRACK vulnerability
-Fixed CVE-2017-14491: DNS - 2 byte heap based overflow
-Fixed CVE-2017-14492: DHCP - heap based overflow
-Fixed CVE-2017-14493: DHCP - stack based overflow
-Fixed CVE-2017-14494: DHCP - info leak
-Fixed CVE-2017-14495: DNS - OOM DoS
-Fixed CVE-2017-14496: DNS - DoS Integer underflow
-Fixed CVE-2017-13704 : Bug collision
-Fixed predictable session tokens(CVE-2017-15654), logged user IP validation(CVE-2017-15653), Logged-in information disclosure (special thanks for Blazej Adamczyk contribution)
-Fixed web GUI authorization vulnerabilities.
-Fixed AiCloud XSS vulnerabilities
-Fixed XSS vulnerability. Thanks for Joaquim's contribution.
-Fixed LAN RCE vulnerability. An independent security researcher has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program
-Fixed remote code execution vulnerability. Thanks to David Maciejak of Fortinet's FortiGuard Labs
-Fixed Smart Sync Stored XSS vulnerabilities. Thanks fo Guy Arazi's contribution.
-Fixed CVE-2018-5721 Stack-based buffer overflow.
New features
-HDD Hibernation
-URL filter black/white list
-Bandwidth limiter on guest network
-URL filter support https website
Bug fixed
-Fixed CTF related issues
-Fixed AiCloud smart sync issue.
-Fixed client icon modification issue when client name includes special characters.
-Fixed AiCloud smart sync problem.
Please unzip the firmware file first then check the MD5 code.
MD5: 8cebc204c8a5ff71fbb6b76b4828cfe7