![]() ![]() ![]() Thanks to Quentin Kaiser from IoT Inspector Research Lab contribution. This version includes several vulnerability patches. ![]() Please unzip the firmware file first then check the MD5 code. Fixed DDNS issues where the WAN IP is IPv6 Fixed UI bugs in Administration -> feedback. Fixed CVE-2021-34174, CVE-2022-23972, CVE-2022-23970, CVE-2022-23971, CVE-2022-23973 Added more ISP profile Digi 1 - TM Digi 2 - TIME Digi 3 - Digi Digi 4 - CTS Digi 5 - ALLO Digi 6 - SACOFA Maxis - CTS Maxis - SACOFA Maxis - TNB/ALLO Fixed AiMesh guest network issues. Fixed SQL injection vulnerability -Fixed json file traversal vulnerability -Fixed plc/port file traversal vulnerability -Fixed stack overflow vulnerability Thanks to HP of Cyber Kunlun Lab -Fixed authenticated stored XSS vulnerability Thanks to Luke Walker – SmartDCC -Fixed LPD denial of service vulnerability -Fixed cfgserver heap overflow vulnerability -Fixed cfgserver denial of service vulnerability Thanks to TianHe from BeFun Cyber Security Lab. Security - Fixed string format stacks vulnerability - Fixed cross-site-scripting vulnerability - Fixed informational vulnerability. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |