ASUS ZenWiFi AC (CT8)|Whole Home Mesh WiFi System|ASUS United Kingdom

您所在的位置:网站首页 华硕 CT8 拆 ASUS ZenWiFi AC (CT8)|Whole Home Mesh WiFi System|ASUS United Kingdom

ASUS ZenWiFi AC (CT8)|Whole Home Mesh WiFi System|ASUS United Kingdom

2024-07-12 11:36| 来源: 网络整理| 查看: 265

ASUS ZenWiFi CT8 Firmware version 3.0.0.4.386.45934 Version 3.0.0.4.386.45934 37.09 MB 2021/11/17

1. AiMesh 2.0- System optimization: one click in AiMesh to optimize the topology- System Ethernet backhaul mode, all nodes will only connect by ethernet, all bands will be released for wireless clients.- System factory default and reboot.- Client device reconnect, make the device to offline and online again.- Client device binding to specific AP.- Guest WiFi on all Mesh nodes (all node need to upgrade to 3.0.0.4.386 firmware)- Access nodes USB application.

Connection priority and Ethernet backhaul mode introductionhttps://www.asus.com/support/FAQ/1044184

How to setup ASUS AiMesh or ZenWiFi Mesh Ethernet backhaul under different conditionshttps://www.asus.com/support/FAQ/1044151/

2. New Family interface in ASUS router App.ASUS Router App for iOS must greater or equal to iOS v1.0.0.5.75Android version greater or equal to v1.0.0.5.74

3. The unit of the WiFi time scheduler goes to 1 minute.

4. Support IPSec IKE v1 and IKE v2, and you can use the Windows 10 native VPN client program to connect to the router's IPSec VPN server. The Windows 10 new FAQ is in https://www.asus.com/support/FAQ/1033576

5. 2.4 and 5G on the network map could be configured in the same tab.

6. Captcha for login can be disabled in administration -> system.

7. Printer server port can be disabled on the USB app page.

8. Clients which connect to the guest network can be viewed in the network map -->view list --> interface

9. Fix Let's Encrypt not working properly.

10. Add IPTV supports for specific region.

Security fixes:

1. Fixed CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687, CVE-2020-25684, CVE-2020-25685, CVE-2020-25686

2. Fixed DoS vulnerability. Thanks for Tsinghua University NISL's contribution.

3. Fixed DoS vulnerability from spoofed sae authentication frame. Thanks for Efstratios Chatzoglou, University of the Aegean, Georgios Kambourakis, European Commission at the European Joint Research Centre, and Constantinos Kolias, University of Idaho.

4. Fixed Stored XSS vulnerability.

5. .Fixed CVE-2021-41435, CVE-2021-41436.Thanks to Efstratios Chatzoglou, University of the Aegean

6. BusyBox- CVE-2016-2148- CVE-2016-6301- CVE-2018- 1000517

7. cURL- CVE-2020-8169- CVE-2019-5481- CVE-2019-5482- CVE-2018-1000120- CVE-2018- 1000300- CVE-2018-16839

8. Lighttpd- CVE-2018-19052

9. Linux- CVE-2020-14305- CVE-2020-25643- CVE-2019-19052

10. lldpd- CVE-2020-27827

11. Avahi- CVE-2017-6519

12. hostapd- CVE-2021-30004- CVE-2019-16275

13. OpenVPN- CVE-2020-11810- CVE-2020-15078

14. wpa- CVE-2021-30004- CVE-2021-27803- CVE-2019-11555- CVE-2019-9499- CVE-2019-9498- CVE-2019-9497- CVE-2019-9496- CVE-2019-9495- CVE-2019-9494- CVE-2017-13086- CVE-2017-13084- CVE-2017-13082- CVE-2016-4476- CVE-2015-8041

15. Fixed httpd vulnerabilityThanks to Wei Fan contribution.

16. Fixed stack overflow vulnerability

17. Fixed DoS vulnerabilityThanks to 360 Future Security Lab's contribution.

Please unzip the firmware file first then check the MD5 code.MD5:1ea263bfdf97fd5e608ddebb27b1804d



【本文地址】


今日新闻


推荐新闻


CopyRight 2018-2019 办公设备维修网 版权所有 豫ICP备15022753号-3