RT-AC66U B1
Регистрация устройства поможет вам управлять его гарантией, получать техническую поддержку и отслеживать статус ремонта.
BIOS и ПО
Нужна помощь?
Bug fixes and functionality modifications:
-Resolved the issue with login and password changes.
-Fixed the issue where Traffic Analyzer sometimes couldn’t record data.
Security updates:
-Enabled and supported ECDSA certificates for Let’s Encrypt.
-Enhanced protection for credentials.
-Enhanced protection for OTA firmware updates.
-Fixed DoS vulnerabilities in firewall configuration pages. Thanks to Jinghe Gao’s contribution.
-Fixed DoS vulerabilities in httpd. Thanks to Howard McGreehan.
-Fixed information disclosure vulnerability. Thanks to Junxu (Hillstone Network Security Research Institute) contribution.
-Fixed CVE-2023-28702 and CVE-2023-28703. Thanks to Xingyu Xu(@tmotfl) contribution.
-Fixed null pointer dereference vulnerabilities. Thanks to Chengfeng Ye, Prism Research Group — cse hkust contribution.
-Fixed the cfg server vulnerability. Thanks to Swing and Wang Duo from Chaitin Security Research Lab.
-Fixed the vulnerability in the logmessage function. Thanks to Swing and Wang Duo from Chaitin Security Research Lab C0ss4ck from Bytedance Wuheng Lab, Feixincheng from X1cT34m.
Please unzip the firmware file, and then verify the checksum.
SHA256: 6040822e6ab3d1bafc756fb038c2f3559aa1004a2af2d2bc52684f39004a2f65
1.Fixed HTTP response splitting vulnerability.
2.Fixed Samba related vulerabilities.
3.Fixed cfg server security issues.
4.Fixed Open redirect vulnerability.
5.Fixed token authentication security issues.
6.Fixed security issues on the status page.
7.Fixed XSS vulnerability.
8.Fixed CVE-2022-26376
9.Fixed CVE-2018-1160
10.Fixed IPv6-related bugs.
11.Added a new login URL http://www.asusrouter.com to fixed the login issues.
12.Optimize the AiMesh web interface
13.Fixed network map UI bugs
14.Fixed bugs related to Wi-Fi calling.
15.Supported web history record exported.
16.Fixed IPSec VPN server compatibility with Windows 10 VPN client.
17.Improved AiMesh connection stability.
18.Fixed IPTV issues.
19. Fixed CVE-2022-35401 authentication bypass vulnerability.
20. Fixed CVE-2022-38105 information disclosure vulnerability in CM process.
21. Fixed CVE-2022-38393 DoS vulnerability in cfg_server.
Please unzip the firmware file first then check the MD5 code.
MD5: 1db86bb601019bd30fa73f011fd33fab
1. Fixed CVE-2018-1160. Thanks to Steven Sroba
2. Fixed CVE-2022-26376.
3. Improved system stability.
4. Added 3rd party DNS server list in WAN —> DNS to help users enhance the connection security.
Please unzip the firmware file first then check the MD5 code.
MD5: df22d37f18b8595d953dafd14da92b74
1. Fixed OpenSSL CVE-2022-0778
2. Added more security measures to block malware.
3. Fixed Stored XSS vulnerability. Thanks to Milan Kyselica of IstroSec.
4. Fixed CVE-2022-23970, CVE-2022-23971, CVE-2022-23972, CVE-2022-23973, CVE-2022-CVE-2022-25595, CVE-2022-25596, CVE-2022-25596,
5. Added 3rd party DNS server list in WAN —> DNS to help users enhance the connection security.
Please unzip the firmware file first then check the MD5 code.
MD5:366f408000cad142bc51eff791ff79fc
Security
— Fixed string format stacks vulnerability
— Fixed cross-site-scripting vulnerability
— Fixed informational vulnerability.
Thanks to Howard McGreehan.
-Fixed SQL injection vulnerability
-Fixed json file traversal vulnerability
-Fixed plc/port file traversal vulnerability
-Fixed stack overflow vulnerability
Thanks to HP of Cyber Kunlun Lab
-Fixed authenticated stored XSS vulnerability
Thanks to Luke Walker – SmartDCC
-Fixed LPD denial of service vulnerability
-Fixed cfgserver heap overflow vulnerability
-Fixed cfgserver denial of service vulnerability
Thanks to TianHe from BeFun Cyber Security Lab.
Added more ISP profile
Digi 1 — TM
Digi 2 — TIME
Digi 3 — Digi
Digi 4 — CTS
Digi 5 — ALLO
Digi 6 — SACOFA
Maxis — CTS
Maxis — SACOFA
Maxis — TNB/ALLO
Fixed AiMesh guest network issues.
Fixed DDNS issues where the WAN IP is IPv6
Fixed UI bugs in Administration —> feedback.
Fixed time zone error.
Please unzip the firmware file first then check the MD5 code.
MD5:33b491c21c167a8beec2f450aafe1bc2
1. Fixed Let’s encrypt related bugs.
2. Fixed httpd vulnerability
3. Fixed stack overflow vulnerability
4. Fixed DoS vulnerability
Thanks for the contribution of Fans0n、le3d1ng、Mwen、daliy yang from 360 Future Security Labs
5. Fixed AiMesh web page multi-language issues.
6. Fixed Stored XSS vulnerability.
7. Fixed CVE-2021-41435, CVE-2021-41436.
Thanks to Efstratios Chatzoglou, University of the Aegean
Georgios Kambourakis, European Commission at the European Joint Research Centre
Constantinos Kolias, University of Idaho.
8. Fixed Stack overflow vulnerability. Thanks to Jixing Wang (@chamd5) contribution.
9. Fixed information disclosure vulnerability .Thanks to CataLpa from DBappSecurity Co.,Ltd
Hatlab and 360 Alpha Lab contribution.
10.Fixed XSS vulnerability
11.Fixed SQL injection vulnerability
12.Fixed PLC path traversal vulnerability
13.Fixed Stack overflow vulnerability
Thanks to HP of Cyber Kunlun Lab
Please unzip the firmware file first then check the MD5 code.
MD5:eb76e99e0044ae494567b2107ae14b6f
1.Fixed the FragAttack vulnerability.
2.Fixed DoS vulnerability. Thanks for Tsinghua University NISL’s contribution.
3.Improved system stability.
4.Fixed GUI bugs.
5.Security Fixed: CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687, CVE-2020-25684, CVE-2020-25685, CVE-2020-25686
Please unzip the firmware file first then check the MD5 code.
MD5: d5a0acb8cabcf912680f455025aedc7d
Security Fixed:
Fixed CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687, CVE-2020-25684, CVE-2020-25685, CVE-2020-25686
Please be noted this is a quick fix beta version for DNSmasq vulnerabilities. Refer to «Method 2: Update Manually» in https://www.asus.com/support/FAQ/1008000 to update this firmware.
Please unzip the firmware file first then check the MD5 code.
MD5: 75fe5cd89394e41d177f423d0d991bc2
1. Fixed Let’s Encrypt not working properly.
2. Added IPTV supports for specific region.
3. Fixed parental control issues.
This firmware add more security protection for configuration.
If you want to manually downgrade to previously version, please reset the router to default after downgraded.
Please unzip the firmware file first then check the MD5 code.
1. AiMesh 2.0
— System optimization: one click in AiMesh to optimize the topology
— System Ethernet backhaul mode, all nodes will only connect by ethernet, all bands will be released for wireless clients.
— System factory default and reboot.
— Client device reconnect, make the device to offline and online again.
— Client device binding to specific AP.
— Guest WiFi on all Mesh nodes (all node need to upgrade to 3.0.0.4.386 firmware)
— Access nodes USB application.
Connection priority and Ethernet backhaul mode introduction
https://www.asus.com/support/FAQ/1044184
How to setup ASUS AiMesh or ZenWiFi Mesh Ethernet backhaul under different conditions
https://www.asus.com/support/FAQ/1044151/
2. New Family interface in ASUS router App.
ASUS Router App for iOS must greater or equal to iOS v1.0.0.5.75
Android version greater or equal to v1.0.0.5.74
3. The unit of the WiFi time scheduler goes to 1 minute.
4. 2.4 and 5G on the network map could be configured in the same tab.
5. Captcha for login can be disabled in administration -> system.
6. Printer server port can be disabled on the USB app page.
7. Clients which connect to the guest network can be viewed in the network map —>view list —> interface
Please unzip the firmware file first then check the MD5 code.
MD5: 6d9ea61699a985645d83edf0b415476a
RT-AC66U B1
By registering your device, you can easily manage your product warranty, get technical support and keep track of your repair status.
Driver & Tools
Need Help?
- Products certified by the Federal Communications Commission and Industry Canada will be distributed in the United States and Canada. Please visit the ASUS USA and ASUS Canada websites for information about locally available products.
- All specifications are subject to change without notice. Please check with your supplier for exact offers. Products may not be available in all markets.
- Specifications and features vary by model, and all images are illustrative. Please refer to specification pages for full details.
- PCB color and bundled software versions are subject to change without notice.
- Brand and product names mentioned are trademarks of their respective companies.
- The terms HDMI and HDMI High-Definition Multimedia Interface, HDMI trade dress and the HDMI Logos are trademarks or registered trademarks of HDMI Licensing Administrator, Inc. in the United States and other countries.
-
- The actual transfer speed of USB 3.0, 3.1, 3.2, and/or Type-C will vary depending on many factors including the processing speed of the host device, file attributes and other factors related to system configuration and your operating environment.
- Actual data throughput and WiFi coverage will vary from network conditions and environmental factors, including the volume of network traffic, building material and construction, and network overhead, result in lower actual data throughput and wireless coverage.
- Quoted network speeds and bandwidth based on current IEEE 802.11ac specifications. Actual performance may be affected by network and service provider factors, interface type, and other conditions. Connected devices must be 802.11ac-compatible for best results.
- WPA/WPA2 enterprise is only available on single router, is not available under AiMesh mode.
- When traditional QoS is enabled, there will be limitations due to the actual Internet service bandwidth and different environment, and there may be a risk of speed reduction.
- Due to the different power supply requirements on USB external hard disk and 4G/5G Modem device, to ensure that the external device can be used stably, if the USB external device exceeds the standard USB 2.0 (5V/500mA) and USB 3.1 Gen 1 (5V/900mA) power supply requirements, you need to use it with an independent external power supply.
- If you use the product in conjunction with a third party service, you are responsible for complying with the third party provider’s terms and conditions and privacy policy and are also at the risk of such use. ASUS does not provide support or guarantee continuous integration support for products that are not part of ASUS.