AiMesh AX6100 WiFi System (RT-AX92U 2 Pack)
BIOS & FIRMWARE
- Driver & Tools
- BIOS & FIRMWARE
Please unzip the firmware file, and then verify the checksum.
SHA256: 1730ecd8f23ebff809abb3124de265cf5f946f39b27ae85373740f49b90e8718
1. Strengthened input validation and data processing workflows to further protect information security.
2. Enhanced AiCloud password protection mechanisms, safeguarding against unauthorized access attempts.
3. Enhanced device security through improved buffer handling in connection features.
4. Refined data handling processes, ensuring secure and accurate information management.
5. Enhanced file access control mechanisms, promoting a more secure operating environment.
6. Strengthened certificate protection, providing enhanced data security.
Bug fixes and functionality modifications:
-Resolved the issue with login and password changes.
-Resolved the IPSec VPN connection issues.
-Resolved the Instant Guard connection issues.
-Fixed the issue where Traffic Analyzer sometimes couldn't record data.
-Fixed the time display issue for the preferred upgrade time in the Auto Firmware Upgrade function.
-Enabled DynDNS and No-IP DDNS to use IPv6.
-Fixed AiMesh preferred AP identification in site survey results.
-Updated timezone list for Greenland, Mexico, and Iran.
-Allowed WireGuard Server clients to access the Samba server.
-Fixed memory leak issue.
-Resolved the issue where the USB path is not displayed on the Media Server page in the AiMesh node
Security updates:
-Enabled and supported ECDSA certificates for Let's Encrypt.
-Enhanced protection for credentials.
-Enhanced protection for OTA firmware updates.
-Fixed DoS vulnerabilities in firewall configuration pages.
-Fixed DoS vulerabilities in httpd.
-Fixed information disclosure vulnerability.
-Fixed CVE-2023-28702 and CVE-2023-28703.
-Fixed null pointer dereference vulnerabilities.
-Fixed the cfg server vulnerability.
-Fixed the vulnerability in the logmessage function CVE-2023-35086/ CVE-2023-35087.
-Fixed lighttpd vulnerability, CVE-2023-35720.
-Fixed several curl vulnerabilities including CVE-2023-28322, CVE-2023-28321, and CVE-2023-28319.
-Fixed FFmpeg vulnerabilities, specifically CVE-2022-3964, CVE-2022-48434, and CVE-2022-3109.
-Fixed openssl vulnerability, CVE-2023-0464.
-Fixed ReadyMedia vulnerabilitym CVE-2020-28926.
-Fixed UPnP vulnerability CVE-2020-12695.
-Patched a command injection vulnerability to improve overall security.
-Strengthened protection against SSH brute force attacks.
Please unzip the firmware file, and then verify the checksum.
SHA256: 495dd81a5c17ca7e790affeb7b575b59e9e12052e5ee97614a8e07c5330cea87
Try more on ASUSWRT 2022 with new features at https://asus.click/ASUSWRT2022
1. Supported WireGuard VPN server and client.
2. Supported VPN fusion. It can easily achieve VPN connection to network devices like Smart TV, Game consoles and without installing the VPN client software.
3. Supported new devices connection notification.
4. Supported connection diagnostic on the ASUS router app.
5. Supported Instant Guard 2.0 which helps easily invite family or friends to join the VPN connection.
6. Upgraded parental control and added reward, new scheduler for flexible setting
7. Fixed USB icon issue in port status.
8. Fixed HTTP response splitting vulnerability. Thanks to Efstratios Chatzoglou, University of the Aegean.
9. Fixed status page HTML vulnerability. Thanks to David Ward.
10. Fixed CVE-2018-1160. Thanks to Steven Sroba.
11. Fixed cfg_server security issue.
Please unzip the firmware file first then check the MD5 code.
MD5: 4398806f637ef052cf83380f31b3ae88
Security
- Fixed string format stacks vulnerability
- Fixed cross-site-scripting vulnerability
- Fixed informational vulnerability.
Thanks to Howard McGreehan.
-Fixed SQL injection vulnerability
-Fixed json file traversal vulnerability
-Fixed plc/port file traversal vulnerability
-Fixed stack overflow vulnerability
Thanks to HP of Cyber Kunlun Lab
-Fixed authenticated stored XSS vulnerability
Thanks to Luke Walker – SmartDCC
-Fixed LPD denial of service vulnerability
-Fixed cfgserver heap overflow vulnerability
-Fixed cfgserver denial of service vulnerability
Thanks to TianHe from BeFun Cyber Security Lab.
Added more ISP profile
Digi 1 - TM
Digi 2 - TIME
Digi 3 - Digi
Digi 4 - CTS
Digi 5 - ALLO
Digi 6 - SACOFA
Maxis - CTS
Maxis - SACOFA
Maxis - TNB/ALLO
Fixed AiMesh guest network issues.
Fixed DDNS issues where the WAN IP is IPv6
Fixed UI bugs in Administration --> feedback.
Fixed time zone error.
Improved the connection stability.
Please unzip the firmware file first then check the MD5 code.
MD5: 9b13dc23c96d92bf66789016927aa6a9
1. Fixed Let's encrypt related bugs.
2. Fixed httpd vulnerability
3. Fixed stack overflow vulnerability
4. Fixed DoS vulnerability
Thanks for the contribution of Fans0n、le3d1ng、Mwen、daliy yang from 360 Future Security Labs
Please unzip the firmware file first then check the MD5 code.
MD5:6c5f7cf5bf9e286c0b3c9d13a3fbc793
This version includes several vulnerability patches.
BusyBox
- CVE-2016-2148
- CVE-2016-6301
- CVE-2018-1000517
cURL
- CVE-2020-8169
- CVE-2019-5481
- CVE-2019-5482
- CVE-2018-1000120
- CVE-2018- 1000300
- CVE-2018-16839
Lighttpd
- CVE-2018-19052
Linux
- CVE-2020-14305
- CVE-2020-25643
- CVE-2019-19052
lldpd
- CVE-2020-27827
Avahi
- CVE-2017-6519
hostapd
- CVE-2021-30004
- CVE-2019-16275
OpenVPN
- CVE-2020-11810
- CVE-2020-15078
wpa
- CVE-2021-30004
- CVE-2021-27803
- CVE-2019-11555
- CVE-2019-9499
- CVE-2019-9498
- CVE-2019-9497
- CVE-2019-9496
- CVE-2019-9495
- CVE-2019-9494
- CVE-2017-13086
- CVE-2017-13084
- CVE-2017-13082
- CVE-2016-4476
- CVE-2015-8041
-Fixed DoS vulnerability from spoofed sae authentication frame. Thanks to Efstratios Chatzoglou, University of the Aegean, Georgios Kambourakis, European Commission at the European Joint Research Centre, and Constantinos Kolias, University of Idaho.
-Fixed envrams exposed issue. Thanks to Quentin Kaiser from IoT Inspector Research Lab contribution.
-Fixed AiMesh web page multi-language issues.
-Fixed Stored XSS vulnerability.
-Fixed CVE-2021-41435, CVE-2021-41436.
Thanks to Efstratios Chatzoglou, University of the Aegean
Georgios Kambourakis, European Commission at the European Joint Research Centre
Constantinos Kolias, University of Idaho.
-Fixed Stack overflow vulnerability. Thanks to Jixing Wang (@chamd5) contribution.
-Fixed information disclosure vulnerability .Thanks to CataLpa from DBappSecurity Co.,Ltd Hatlab and 360 Alpha Lab contribution.
Supported v6plus
Please unzip the firmware file first then check the MD5 code.
MD5: ea898a4991f6be3c6231c729fca0a188
Bug Fixes:
- Fix 5GHz WiFi abnormal issue.
- Fix parental control abnormal issue with app. (Need to work with iOS v.1.0.0.6.46 Android 1.0.0.6.45 and later versions)
Please unzip the firmware file first then check the MD5 code.
MD5: 3d1d59b5f3c0e0d9639c38fd4c8ac3a5
1.Fixed the FragAttack vulnerability.
2.Fixed DoS vulnerability. Thanks for Tsinghua University NISL's contribution.
3.Improved system stability.
4.Fixed GUI bugs.
5.Security Fixed: CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687, CVE-2020-25684, CVE-2020-25685, CVE-2020-25686
Please unzip the firmware file first then check the MD5 code.
MD5: 2ddbe4aa7ad87b8de519c9f2fcd8bcab
Security Fixed:
Fixed CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687, CVE-2020-25684, CVE-2020-25685, CVE-2020-25686
Please be noted this is a quick fix beta version for DNSmasq vulnerabilities. Refer to "Method 2: Update Manually" in https://www.asus.com/support/FAQ/1008000 to update this firmware.
Please unzip the firmware file first then check the MD5 code.
MD5: 344aac862943f4f5026531587c4e04ea
[Known issue] If your RT-AX92U firmware was 3.0.0.4.386.41535, please use ASUS Router App or the firmware check button in Web GUI to upgrade firmware.
Manually upload the firmware from 386.41535 to 386.41712 might not be successful.
Other versions before 386.41535 do not have this issue.
1. AiMesh 2.0
- System optimization: one click in AiMesh to optimize the topology
- System Ethernet backhaul mode, all nodes will only connect by ethernet, and all bands can release for wireless clients.
- System factory default and reboot.
- Client device reconnect, make the device offline and online again.
- Client device binding to specific AP.
- Guest WiFi on all Mesh nodes (all node need to upgrade to 3.0.0.4.386 firmware)
- Access nodes USB application.
Connection priority and Ethernet backhaul mode introduction
https://www.asus.com/support/FAQ/1044184
How to setup ASUS AiMesh or ZenWiFi Mesh Ethernet backhaul under different conditions
https://www.asus.com/support/FAQ/1044151/
2. New Family interface in ASUS router App.
ASUS Router App for iOS must greater than iOS v1.0.0.5.75
Android version greater than v1.0.0.5.74
3. The unit of the WiFi time scheduler goes to 1 minute.
4. Support IPSec IKE v1 and IKE v2, and you can use the Windows 10 native VPN client program to connect to the router's IPSec VPN server. The Windows 10 new FAQ is in https://www.asus.com/support/FAQ/1033576
5. 2.4 and 5G settings on the network map could modify in the same tab.
6. Captcha for login can be disabled in the administration -> system.
7. Printer server port can be disabled on the USB app page.
8. Clients who connect to the guest network can be viewed in the network map -->view list --> interface
9. Fixed Let's Encrypt issue.
10. Added IPTV supports for a specific region.
11. Fixed the throughput issue.
Please unzip the firmware file first then check the MD5 code.
MD5: f3f63787fd06a9e1e1af5e9717351f52
New features
1. AiMesh 2.0
- System optimization: one click in AiMesh to optimize the topology
- System Ethernet backhaul mode, all nodes will only connect by ethernet, all bands will be released for wireless clients.
- System factory default and reboot.
- Client device reconnect, make the device to offline and online again.
- Client device binding to specific AP.
- Guest WiFi on all Mesh nodes (all node need to upgrade to 3.0.0.4.386 firmware)
- Access nodes USB application.
Connection priority and Ethernet backhaul mode introduction
https://www.asus.com/support/FAQ/1044184
How to setup ASUS AiMesh or ZenWiFi Mesh Ethernet backhaul under different conditions
https://www.asus.com/support/FAQ/1044151/
2. New Family interface in ASUS router App.
ASUS Router App for iOS must greater or equal to iOS v1.0.0.5.75
Android version greater or equal to v1.0.0.5.74
3. The unit of the WiFi time scheduler goes to 1 minute.
4. Support IPSec IKE v1 and IKE v2, and you can use the Windows 10 native VPN client program to connect to the router's IPSec VPN server. The Windows 10 new FAQ is in https://www.asus.com/support/FAQ/1033576
5. 2.4 and 5G on the network map could be configured in the same tab.
6. Captcha for login can be disabled in administration -> system.
7. Printer server port can be disabled on the USB app page.
8. Clients which connect to the guest network can be viewed in the network map -->view list --> interface
Please unzip the firmware file first then check the MD5 code.
MD5: 562eeec3ce5a914c8f58c721b6fb38fe
- Enhanced AiMesh connection stability
- Modified the Telnet/SSH setting UI message
- Fixed login bugs.
- Support router certificate export. After import the certificate to the computer you will not see the warning message when login with https. Please refer to https://www.asus.com/us/support/FAQ/1034294/
* By updating to this version, it's recommended to factory reset your RT-AX92U.
Please unzip the firmware file first and then check the MD5 code.
MD5: 5f8021fe7b934033f424589459caf964
1. Update Adaptive QoS categories: Help you to prioritize the mission-critical applications
Those people who work-from-home & learn-from-home will greatly benefit from this new feature with optimized streaming experiences.
New Supported Categories & Apps:
- Video conferencing, including Microsoft Teams®, ZOOM®, Skype®, Google Hangouts®, BlueJeans®
- Online learning, including Khan academy®, Udemy®, Coursera®, TED®, VIPKiD®, 51Talk®, XDF®, Xueersi®
- Streaming, including YouTube®, Netflix®, HBO NOW®, Amazon Prime Video®, Disney+®, ESPN®, MLB.com®, iQIY®
- Indoor training, including Zwift®, Peloton®, Onelap®
Stay tuned and more apps are coming to the list soon!
2. Support Mobile Game Mode and upgrade your RT-AX92U to a Gaming Mesh
- One-click prioritizing your mobile device to the highest and ensure you the best mobile gaming experiences.
- Install/Update ASUS Router App (Android supports later than 1.0.0.5.44; iOS supports later than 1.0.0.5.41)
Please unzip the firmware file first and then check the MD5 code.
MD5: 9c58aea14b3c4d15350bdab73ec89eae
- Fixed CVE-2019-15126 (Kr00k) vulnerability.
- Improved system stability.
Please unzip the firmware file first then check the MD5 code.
MD5: eb60a8bcd115040ef3256cbeb54bf6a6
- Enhanced the Wi-Fi 6 performance with Apple® iPhone11, Samsung® S10.
- Supported WPA3.
- Supported OFDMA.
- Supported 802.11k and 802.11v.
- Fixed Let's encrypt register related bugs.
- Fixed openVPN related bugs.
- Improved system stability.
Please unzip the firmware file first then check the MD5 code.
MD5: a6c2975e498045a1f3fd9bcd5a6bb576
- Improve wireless stability.
Please unzip the firmware file first then check the MD5 code.
MD5: aedbcc2a7c7b4e1006e8d1ac556bb584
Security fix
- Fixed a DDoS vulnerability. Thanks for Altin Thartori's contribution.
Bug fix
- Fixed web control interface login problem.
- Fixed Network map clist list issues.
- Fixed block internet access problem when clients connected to AiMesh node
- Fixed Samba server compatibility issue.
- Fixed OpenVPN related bugs.
- Fixed schedule reboot bugs.
- Improved AiMesh compatibility.
- Improved system stability.
- Fixed User interface related bugs.
Please unzip the firmware file first then check the MD5 code.
MD5: 39f463d3d1a11335d56815f66aa633a9
-Stability improvement
- Fixed PPPoE issues
Please unzip the firmware file first then check the MD5 code.
MD5: 3b736cebac7f45f7651c3f7f0dff692c
- Optimize backhaul connection
- Fix reboot error
Please unzip the firmware file first then check the MD5 code.
MD5: 930572f44ba084a546b72c0c8d4e639e
- Fix roaming related issue.
- Fix internet connection stability issues.
- Improves combatibility with wifi clients.
Please unzip the firmware file first then check the MD5 code.
MD5: 265ec3341e559b8ba9bf543a11f178c3
- Add WAN aggregation
Please unzip the firmware file first then check the MD5 code.
MD5: 073ea5d0c5988b5ebd09d5fe311909e1
The first version of firmware for RT-AX92U
Please unzip the firmware file first then check the MD5 code.
MD5: beb91941256e58205b487ee21f26d364