<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
    <channel>
        <title><![CDATA[EdgeRouter | Releases | Ubiquiti Community]]></title>
        <description><![CDATA[EdgeRouter | Releases | Ubiquiti Community]]></description>
        <link>https://community.ui.com</link>
        <image>
            <url>https://community.ui.com/images/og-image.jpg</url>
            <title>EdgeRouter | Releases | Ubiquiti Community</title>
            <link>https://community.ui.com</link>
        </image>
        <generator>Ubiquiti Community</generator>
        <lastBuildDate>Sun, 10 May 2026 18:03:35 GMT</lastBuildDate>
        <atom:link href="https://community.ui.com/rss/releases/EdgeRouter/449d1a25-b4a2-454f-a5da-4e3744118c5d" rel="self" type="application/rss+xml"/>
        <pubDate>Sun, 10 May 2026 18:03:35 GMT</pubDate>
        <copyright><![CDATA[© 2026 Ubiquiti Inc. All rights reserved.]]></copyright>
        <item>
            <title><![CDATA[EdgeRouter 3.0.1]]></title>
            <description><![CDATA[<h2>Overview</h2><p>EdgeRouter v3.0.1 includes the below bugfixes and improvements.</p><h2>Bugfixes</h2><ul><li>Fixed an issue that occurred when adding multiple subnets to IPSec peers.</li><li>Fixed handling of optional fields in VPN – WireGuard.</li><li>Fixed incorrect network validation in VPN – WireGuard.</li><li>Fixed focus behavior so the username field is now selected automatically after the login screen loads.</li></ul><h2>Known issues</h2><ul><li>[Upgrade] - In previous firmware versions, an incorrect error message may appear in Chrome, indicating that the firmware upgrade failed after the upload completed. To finalize the upgrade, simply close the error modal and restart the router using the button in the header.</li><li>[DPI] - Sometimes, DPI is reporting wrong rx/tx counters.</li><li>[Offloading] - L2TP IPSec traffic is not being offloaded on&nbsp;<em>Mediatek-based</em>&nbsp;routers (ER-X, ER-X-SFP, EP-R6).</li><li>[Offloading] - VLAN traffic is not being offloaded on ER-12.</li></ul><h2>Additional information</h2><ul><li>EdgeRouter firmware can be installed via the&nbsp;CLI,&nbsp;web interface or&nbsp;UISP. Detailed installation instructions are available&nbsp;<a href="https://help.ui.com/hc/en-us/articles/205146110-EdgeRouter-How-to-Upgrade-the-EdgeOS-Firmware" rel="noopener noreferrer" target="_blank">here</a>.</li><li>The&nbsp;ER-X/ER-X-SFP/ER-10X/EP-R6&nbsp;has more limited storage, and in some cases, an upgrade may fail due to not enough space.</li><li class="ql-indent-1">If this happens, remove the old backup image first (using&nbsp;<code>delete system image</code>&nbsp;CLI command, see&nbsp;<a href="https://help.ubnt.com/hc/en-us/articles/205146110-EdgeMAX-Upgrading-EdgeOS-firmware" rel="noopener noreferrer" target="_blank">here</a>&nbsp;for more details).</li></ul>]]></description>
            <link>https://community.ui.com/releases/EdgeRouter-3-0-1/7fe6b39d-baea-4ce6-87a0-5dcdc9538c3a</link>
            <guid isPermaLink="false">7fe6b39d-baea-4ce6-87a0-5dcdc9538c3a</guid>
            <category><![CDATA[edgemax]]></category>
            <dc:creator><![CDATA[Stemby-UI]]></dc:creator>
            <pubDate>Wed, 29 Oct 2025 14:06:15 GMT</pubDate>
        </item>
        <item>
            <title><![CDATA[EdgeRouter 3.0.0]]></title>
            <description><![CDATA[<h2>Overview</h2><p>EdgeRouter 3.0.0 includes a new redesigned web interface and adds support for WireGuard VPN.</p><p><br></p><p><strong>Updated Web Interface</strong></p><p>The interface has been updated and adds a new section for configuring WireGuard.</p><img src="https://img.community.ui.com/cc30a9bc-0bf5-4daf-a197-5e0098e1ff07/releases/33ee3852-b5db-453e-ad14-430bc218c02f/47c2aae3-3bc7-4340-8824-270cdd04c98d" style="width: 100%;object-fit: cover;height: 205px" /><img src="https://img.community.ui.com/cc30a9bc-0bf5-4daf-a197-5e0098e1ff07/releases/33ee3852-b5db-453e-ad14-430bc218c02f/bfb091d6-d669-4991-a4d6-b2c1a15a4548" style="width: 100%;object-fit: cover;height: 205px" /><p><strong>WireGuard VPN</strong></p><p>Allows you to connect the EdgeRouter to another WireGuard peer to set up different VPN types.</p><ul><li>Site-to-Site VPN - Connect to a WireGuard peer and dynamically or statically route traffic between the sites.</li><li>VPN Server- Allows remote WireGuard clients to connect to the EdgeRouter and access the LAN.</li><li>VPN Client - Connect to a VPN provider and route traffic over the WireGuard VPN with <a href="https://help.ui.com/hc/en-us/articles/204952274" rel="noopener noreferrer" target="_blank">Policy-Based Routing</a>.</li></ul><h2>Improvements</h2><ul><li>Redesigned and updated the web interface.</li><li>Added dark mode support option for the web interface.</li><li>Added support for WireGuard VPN. Configuration is possible using both the web interface and CLI.</li><li>DHCPv6 now ignores advertise messages with none of the requested data and missed status codes.</li><li>Added support for remote access to the local web interface via UISP.</li><li>Added new left menu which replaced tab based navigation.</li><li>Added new version of ports widget on the main header.</li><li>Added system option to theme system settings.</li><li>Added the CPU and HW status to the top bar, increased the size of two-row ports, and added temperature alert.</li><li>Improved security &amp; stability.</li><li>Added factory default firewall configuration, dropping all incoming traffic from&nbsp;<code>eth1</code></li><li>Added filename validation for restoring configuration uploads.</li><li>Added logging of the WebSocket client IP address to allow brute-force attack detection.</li><li>Implemented new validation checks for passwords.</li><li>Disabled SSH in factory default config.</li></ul><h2>Bugfixes</h2><ul><li>Fixed issue with DHCP renewal when using a /32 netmask.</li><li>Fixed restoring of configuration backup.</li><li>Fixed link to UISP application running on UISP Console.</li><li>Fixed issue with upgrade in Chrome.</li></ul><h2>Known issues</h2><ul><li>[Upgrade] - In previous firmware versions, an incorrect error message may appear in Chrome, indicating that the firmware upgrade failed after the upload completed. To finalize the upgrade, simply close the error modal and restart the router using the button in the header.</li><li>[DPI] - Sometimes, DPI is reporting wrong rx/tx counters.</li><li>[Offloading] - L2TP IPSec traffic is not being offloaded on&nbsp;<em>Mediatek-based</em>&nbsp;routers (ER-X, ER-X-SFP, EP-R6).</li><li>[Offloading] - VLAN traffic is not being offloaded on ER-12.</li></ul><h2>Additional information</h2><ul><li>EdgeRouter firmware can be installed via the&nbsp;CLI,&nbsp;web interface or&nbsp;UISP. Detailed installation instructions are available&nbsp;<a href="https://help.ui.com/hc/en-us/articles/205146110-EdgeRouter-How-to-Upgrade-the-EdgeOS-Firmware" rel="noopener noreferrer" target="_blank">here</a>.</li><li>The&nbsp;ER-X/ER-X-SFP/ER-10X/EP-R6&nbsp;has more limited storage, and in some cases, an upgrade may fail due to not enough space.</li><li class="ql-indent-1">If this happens, remove the old backup image first (using&nbsp;<code>delete system image</code>&nbsp;CLI command, see&nbsp;<a href="https://help.ubnt.com/hc/en-us/articles/205146110-EdgeMAX-Upgrading-EdgeOS-firmware" rel="noopener noreferrer" target="_blank">here</a>&nbsp;for more details).</li></ul>]]></description>
            <link>https://community.ui.com/releases/EdgeRouter-3-0-0/33ee3852-b5db-453e-ad14-430bc218c02f</link>
            <guid isPermaLink="false">33ee3852-b5db-453e-ad14-430bc218c02f</guid>
            <category><![CDATA[edgemax]]></category>
            <dc:creator><![CDATA[Stemby-UI]]></dc:creator>
            <pubDate>Tue, 29 Jul 2025 10:42:33 GMT</pubDate>
        </item>
        <item>
            <title><![CDATA[EdgeMAX EdgeRouter v2.0.9-hotfix.7]]></title>
            <description><![CDATA[<h2>Overview</h2><p>EdgeRouter v2.0.9-hotfix.7 includes the below bugfixes and improvements.</p><h2>Improvements</h2><ul><li>Require password change on first login.</li><li>Updated UISP Application connector.</li></ul><h2>Bugfixes</h2><ul><li>Updated OpenSSL to fix recently reported CVEs.</li><li>Updated MiniUPnPd to fix a heap overflow vulnerability. (see&nbsp;<a href="https://community.ui.com/releases/Security-Advisory-Bulletin-033-033/17f7c7c0-830b-4625-a2ee-e90e514e7b0f" rel="noopener noreferrer" target="_blank">here&nbsp;</a>for more information)</li></ul><h2>Known issues</h2><ul><li>[DPI] - Sometimes DPI is reporting wrong rx/tx counters.</li><li>[Offloading] - L2TP IPSec traffic is not being offloaded on <em>Mediatek-based</em> routers (ER-X, ER-X-SFP, EP-R6).</li><li>[Offloading] - VLAN traffic is not being offloaded on ER-12.</li></ul><h2>Additional information</h2><ul><li>EdgeRouter firmware can be installed via the&nbsp;CLI,&nbsp;web interface or&nbsp;UISP. Detailed installation instructions are available&nbsp;<a href="https://help.ui.com/hc/en-us/articles/205146110-EdgeRouter-How-to-Upgrade-the-EdgeOS-Firmware" rel="noopener noreferrer" target="_blank">here</a>.</li><li>The&nbsp;ER-X/ER-X-SFP/ER-10X/EP-R6&nbsp;has more limited storage, and in some cases, an upgrade may fail due to not enough space.</li><li class="ql-indent-1">If this happens, remove the old backup image first (using <code>delete system image</code> CLI command, see&nbsp;<a href="https://help.ubnt.com/hc/en-us/articles/205146110-EdgeMAX-Upgrading-EdgeOS-firmware" rel="noopener noreferrer" target="_blank">here</a>&nbsp;for more details).</li></ul>]]></description>
            <link>https://community.ui.com/releases/EdgeMAX-EdgeRouter-v2-0-9-hotfix-7/2693d34c-f878-45d3-90af-32da2b4895a2</link>
            <guid isPermaLink="false">2693d34c-f878-45d3-90af-32da2b4895a2</guid>
            <category><![CDATA[edgemax]]></category>
            <category><![CDATA[routing]]></category>
            <dc:creator><![CDATA[UI-Martinh]]></dc:creator>
            <pubDate>Fri, 30 Jun 2023 14:28:56 GMT</pubDate>
        </item>
        <item>
            <title><![CDATA[EdgeMAX EdgeRouter Firmware v2.0.9-hotfix.6]]></title>
            <description><![CDATA[<h2>Overview</h2><p>The&nbsp;ER-X/ER-X-SFP/ER-10X/EP-R6&nbsp;has more limited storage, and in some cases, an upgrade may fail due to not enough space. If this happens, remove the old backup image first (using&nbsp;<code>delete system image</code>&nbsp;CLI command, see&nbsp;<a href="https://help.ubnt.com/hc/en-us/articles/205146110-EdgeMAX-Upgrading-EdgeOS-firmware" rel="noopener noreferrer" target="_blank">here</a>&nbsp;for more details) before doing an upgrade.</p><h2>Bugfixes</h2><ul><li>Fix disclosed security issue. (see&nbsp;<a href="https://community.ui.com/releases/Security-Advisory-Bulletin-028-028/696e4e3b-718c-4da4-9a21-965a85633b5f" rel="noopener noreferrer" target="_blank">here&nbsp;</a>for more information)</li></ul><h2>Additional information</h2><p>EdgeRouter firmware can be installed via&nbsp;CLI,&nbsp;WebGUI&nbsp;or&nbsp;UNMS. Detailed installation instruction is available&nbsp;<a href="https://help.ubnt.com/hc/en-us/articles/205146110-EdgeRouter-How-to-Upgrade-the-EdgeOS-Firmware" rel="noopener noreferrer" target="_blank">here</a>.</p>]]></description>
            <link>https://community.ui.com/releases/EdgeMAX-EdgeRouter-Firmware-v2-0-9-hotfix-6/63aa2542-db99-4f2d-8be2-0717dd2452de</link>
            <guid isPermaLink="false">63aa2542-db99-4f2d-8be2-0717dd2452de</guid>
            <category><![CDATA[edgemax]]></category>
            <category><![CDATA[routing]]></category>
            <dc:creator><![CDATA[UI-Martinh]]></dc:creator>
            <pubDate>Mon, 23 Jan 2023 12:59:58 GMT</pubDate>
        </item>
        <item>
            <title><![CDATA[Security Advisory Bulletin 028]]></title>
            <description><![CDATA[<h2>Overview</h2><p>Published: January 23, 2023</p><p>Version: 1.0</p><p>Revision: 1.0</p><p><strong>&nbsp;</strong></p><p><strong>Summary</strong></p><p>A vulnerability, found in EdgeRouters and UniFi Security Gateways (USG)<strong>*</strong> with their <strong>DHCPv6 prefix delegation</strong> set to <strong>dhcpv6-stateless</strong> or <strong>dhcpv6-stateful</strong>, allows a malicious actor directly connected to the WAN interface of an affected device to create a remote code execution vulnerability.</p><p><strong>&nbsp;</strong></p><p><strong>*Affected Products:</strong></p><p>All EdgeRouters running <strong>Version 2.0.9-hotfix.5 and earlier</strong>.</p><p>All USGs running <strong>Version 4.4.56 and earlier</strong>.</p><p><strong>&nbsp;</strong></p><p><strong>Mitigation:</strong></p><p>Update your EdgeRouter(s) to <strong>Version 2.0.9-hotfix.6 or later</strong>.</p><p>Update your USG(s) to <strong>Version 4.4.57 or later</strong>.</p><p><strong>&nbsp;</strong></p><p><strong>Impact:</strong></p><p><strong>CVSS v3.0 Severity and Metrics:</strong></p><p><strong>Base Score: </strong>7.5 High</p><p><strong>Vector:&nbsp;</strong></p><p><strong>CVSS: </strong><a href="https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" rel="noopener noreferrer" target="_blank">CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</a></p><p><strong>CVE:</strong><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22957" rel="noopener noreferrer" target="_blank"><strong> </strong></a><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23912" rel="noopener noreferrer" target="_blank">CVE-2023-23912</a> (ZDI-CAN-19687 - NCC Group EDG (@alexjplaskett @saidelike @FidgetingBits @_mccaulay) working with Trend Micro Zero Day Initiative)</p><p>&nbsp;</p><p><strong>Reference Links:</strong></p><p><a href="https://community.ui.com/releases/UniFi-Security-Gateway-4-4-57/72409267-0f18-400f-8f44-7242a553e449" rel="noopener noreferrer" target="_blank">https://community.ui.com/releases/UniFi-Security-Gateway-4-4-57/72409267-0f18-400f-8f44-7242a553e449</a></p><p><a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Firmware-v2-0-9-hotfix-6/63aa2542-db99-4f2d-8be2-0717dd2452de" rel="noopener noreferrer" target="_blank">https://community.ui.com/releases/EdgeMAX-EdgeRouter-Firmware-v2-0-9-hotfix-6/63aa2542-db99-4f2d-8be2-0717dd2452de</a></p>]]></description>
            <link>https://community.ui.com/releases/Security-Advisory-Bulletin-028-028/696e4e3b-718c-4da4-9a21-965a85633b5f</link>
            <guid isPermaLink="false">696e4e3b-718c-4da4-9a21-965a85633b5f</guid>
            <category><![CDATA[edgemax]]></category>
            <category><![CDATA[routing]]></category>
            <category><![CDATA[unifi-routing-switching]]></category>
            <category><![CDATA[security]]></category>
            <dc:creator><![CDATA[UI-Marcus]]></dc:creator>
            <pubDate>Mon, 23 Jan 2023 12:59:37 GMT</pubDate>
        </item>
        <item>
            <title><![CDATA[Security Advisory Bulletin 026]]></title>
            <description><![CDATA[<h2>Overview</h2><p>Published: November 23, 2022</p><p>Version: 1.0</p><p>Revision: 1.0</p><p>&nbsp;</p><p><strong>Summary</strong></p><p>A remote code execution vulnerability in EdgeRouters (<strong>Version 2.0.9-hotfix.4 and earlier</strong>) allows a malicious actor with an operator account to run arbitrary administrator commands.</p><p>This vulnerability is fixed in <strong>Version</strong> <strong>2.0.9-hotfix.5 and later</strong>.</p><p>&nbsp;</p><p><strong>Affected Products:</strong></p><p>EdgeRouters</p><p><br></p><p><strong>Mitigation:</strong></p><p>Update your EdgeRouter to <strong>Version 2.0.9-hotfix.5 or later</strong>.</p><p>&nbsp;</p><p><strong>Impact:</strong></p><p><strong>CVSS v3.0 Severity and Metrics:</strong></p><p><strong>Base Score: </strong>8.8 High</p><p><strong>Vector:&nbsp;</strong></p><p><a href="https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" rel="noopener noreferrer" target="_blank"><strong>CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</strong></a></p><p><strong>CVE: </strong><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43553" rel="noopener noreferrer" target="_blank">CVE-2022-43553</a></p><p><br></p><p><br></p><p><strong>Reference Links:</strong></p><p><a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Firmware-v2-0-9-hotfix-5/b3882362-9d9a-4efd-8110-30a1e86e0154" rel="noopener noreferrer" target="_blank">https://community.ui.com/releases/EdgeMAX-EdgeRouter-Firmware-v2-0-9-hotfix-5/b3882362-9d9a-4efd-8110-30a1e86e0154</a></p>]]></description>
            <link>https://community.ui.com/releases/Security-Advisory-Bulletin-026-026/07697c65-30b3-4c06-a158-35e06534480d</link>
            <guid isPermaLink="false">07697c65-30b3-4c06-a158-35e06534480d</guid>
            <category><![CDATA[edgemax]]></category>
            <category><![CDATA[routing]]></category>
            <category><![CDATA[security]]></category>
            <dc:creator><![CDATA[UI-Marcus]]></dc:creator>
            <pubDate>Wed, 23 Nov 2022 16:16:40 GMT</pubDate>
        </item>
        <item>
            <title><![CDATA[EdgeMAX EdgeRouter Firmware v2.0.9-hotfix.5]]></title>
            <description><![CDATA[<h2>Overview</h2><p>The&nbsp;ER-X/ER-X-SFP/ER-10X/EP-R6&nbsp;has more limited storage, and in some cases, an upgrade may fail due to not enough space. If this happens, remove the old backup image first (using <code>delete system image</code> CLI command, see&nbsp;<a href="https://help.ubnt.com/hc/en-us/articles/205146110-EdgeMAX-Upgrading-EdgeOS-firmware" rel="noopener noreferrer" target="_blank">here</a>&nbsp;for more details) before doing an upgrade.</p><h2>Bugfixes</h2><ul><li>Fixed typos in WebUI</li><li>Security: Disclosed security fixes. (see&nbsp;<a href="https://community.ui.com/releases/Security-Advisory-Bulletin-026-026/07697c65-30b3-4c06-a158-35e06534480d" rel="noopener noreferrer" target="_blank">here&nbsp;</a>for more information)</li></ul><h2>Known issues</h2><ul><li>[DPI] - Sometimes DPI is reporting wrong rx/tx counters</li><li>[Offloading] - L2TP IPSec traffic is not being offloaded on&nbsp;<em>Mediatek-based</em>&nbsp;routers (ER-X,&nbsp;ER-X-SFP,&nbsp;EP-R6)</li><li>[Offloading] - VLAN traffic is not being offloaded on&nbsp;ER-12</li></ul><h2>Additional information</h2><p>EdgeRouter firmware can be installed via&nbsp;CLI,&nbsp;WebGUI&nbsp;or&nbsp;UNMS. Detailed installation instruction is available&nbsp;<a href="https://help.ubnt.com/hc/en-us/articles/205146110-EdgeRouter-How-to-Upgrade-the-EdgeOS-Firmware" rel="noopener noreferrer" target="_blank">here</a>.</p>]]></description>
            <link>https://community.ui.com/releases/EdgeMAX-EdgeRouter-Firmware-v2-0-9-hotfix-5/b3882362-9d9a-4efd-8110-30a1e86e0154</link>
            <guid isPermaLink="false">b3882362-9d9a-4efd-8110-30a1e86e0154</guid>
            <category><![CDATA[edgemax]]></category>
            <category><![CDATA[routing]]></category>
            <dc:creator><![CDATA[UI-Martinh]]></dc:creator>
            <pubDate>Wed, 23 Nov 2022 16:08:14 GMT</pubDate>
        </item>
        <item>
            <title><![CDATA[EdgeMAX EdgeRouter Firmware v2.0.9-hotfix.4]]></title>
            <description><![CDATA[<h2>Overview</h2><p>The&nbsp;<strong>ER-X</strong>/<strong>ER-X-SFP</strong>/<strong>ER-10X</strong>/<strong>EP-R6</strong>&nbsp;has more limited storage, and in some cases, an upgrade may fail due to not enough space. If this happens, remove the old backup image first (using <code>delete system image</code> CLI command, see&nbsp;<a href="https://help.ubnt.com/hc/en-us/articles/205146110-EdgeMAX-Upgrading-EdgeOS-firmware" rel="noopener noreferrer" target="_blank">here</a>&nbsp;for more details) before doing an upgrade.</p><h2>Improvements</h2><pre class="ql-syntax" spellcheck="false">Fixed CVE-2020-15078 in OpenVPN
Fixed CVE-2022-0778 in openssl
Fixed CVE-2018-25032 in zlib
Fixed CVE-2020-27827 in lldpd
Fixed CVE-2020-13848 and CVE-2021-28302 in libupnp
Fixed command injection in WebUI
UISP integration updated
</pre><h2>Known issues</h2><ul><li>[DPI] - Sometimes DPI is reporting wrong rx/tx counters</li><li>[Offloading] - L2TP IPSec traffic is not being offloaded on <em>Mediatek-based</em> routers (<strong>ER-X</strong>, <strong>ER-X-SFP,</strong> <strong>EP-R6</strong>)</li><li>[Offloading] - VLAN traffic is not being offloaded on <strong>ER-12 </strong></li></ul><h2>Additional information</h2><p>EdgeRouter firmware can be installed via&nbsp;<strong>CLI</strong>,&nbsp;<strong>WebGUI</strong>&nbsp;or&nbsp;<strong>UNMS</strong>. Detailed installation instruction is available&nbsp;<a href="https://help.ubnt.com/hc/en-us/articles/205146110-EdgeRouter-How-to-Upgrade-the-EdgeOS-Firmware" rel="noopener noreferrer" target="_blank">here</a>.</p>]]></description>
            <link>https://community.ui.com/releases/EdgeMAX-EdgeRouter-Firmware-v2-0-9-hotfix-4/08ce56d4-eb0d-42b1-95ce-f08342e1f7b3</link>
            <guid isPermaLink="false">08ce56d4-eb0d-42b1-95ce-f08342e1f7b3</guid>
            <category><![CDATA[edgemax]]></category>
            <dc:creator><![CDATA[UI-rjokl]]></dc:creator>
            <pubDate>Thu, 07 Jul 2022 18:18:41 GMT</pubDate>
        </item>
        <item>
            <title><![CDATA[EdgeMAX EdgeRouter Firmware v2.0.9-hotfix.2 security update]]></title>
            <description><![CDATA[<h2>Overview</h2><p>The&nbsp;<strong>ER-X</strong>/<strong>ER-X-SFP</strong>/<strong>ER-10X</strong>/<strong>EP-R6</strong>&nbsp;has more limited storage, and in some cases, an upgrade may fail due to not enough space. If this happens, remove the old backup image first (using <code>delete system image</code> CLI command, see&nbsp;<a href="https://help.ubnt.com/hc/en-us/articles/205146110-EdgeMAX-Upgrading-EdgeOS-firmware" rel="noopener noreferrer" target="_blank">here</a>&nbsp;for more details) before doing an upgrade.a</p><p>More details can be found in the release notes below. Please give it a try if you are interested in the new features/changes to help us test them so that we can get the release out sooner! Thanks very much!</p><h2>Improvements</h2><p>n/a</p><h2>Bugfixes</h2><ul><li>[Syslog] - Adjust syslog config to ensure that is uses less RAM when doing heavy logging</li><li>[DHCPv6] - Apply workaround to make DHCPv6 service not to fail if IPv6 WAN address is being delayed</li><li>[Security] - Fix <strong>CVE-2021-3156</strong> vulnerability in sudo</li><li>[Security] - Fix <strong>CVE-2019-12110</strong> DDoS vulnerability in miniupnpd</li><li>[Security] - Fix <strong>CVE-2021-3448</strong> vulnerability in dnsmasq</li><li>[dnsmasq] - Fix wrong version of dnsmasq being displayed via <code>dnsmasq -v</code></li></ul><p>Upgraded following Debian packages:</p><pre class="ql-syntax" spellcheck="false">&nbsp; sudo (1.8.19p1-2.1+deb9u2 =&gt; 1.8.19p1-2.1+deb9u3)
&nbsp; dnsmasq (2.83-1 =&gt; 2.85-1)
&nbsp; grep (2.27-2 =&gt; 3.3-1~bpo9+1)
&nbsp; init (1.48 =&gt; 1.56~bpo9+1)
&nbsp; init-system-helpers (1.48 =&gt; 1.56~bpo9+1)
&nbsp; libassuan0 (2.4.3-2 =&gt; 2.5.2-1~bpo9+1)
&nbsp; libfastjson4 (0.99.4-1 =&gt; 0.99.8-1~bpo9+1)
&nbsp; libidn2-0 (0.16-1+deb9u1 =&gt; 2.0.5-1~bpo9+1)
&nbsp; libip4tc0 (1.6.0+snapshot20161117-6 =&gt; 1.6.2-1.1~bpo9+1)
&nbsp; libldap-2.4-2 (2.4.44+dfsg-5+deb9u4 =&gt; 2.4.47+dfsg-3+deb10u2~bpo9+1)
&nbsp; libldap-common (2.4.44+dfsg-5+deb9u4 =&gt; 2.4.47+dfsg-3+deb10u2~bpo9+1)
&nbsp; liblognorm5 (2.0.1-1.1+b1 =&gt; 2.0.3-1~bpo9+1)
&nbsp; libnl-3-200 (3.2.27-2 =&gt; 3.4.0-1~bpo9+1)
&nbsp; libnl-cli-3-200 (3.2.27-2 =&gt; 3.4.0-1~bpo9+1)
&nbsp; libnl-genl-3-200 (3.2.27-2 =&gt; 3.4.0-1~bpo9+1)
&nbsp; libnl-nf-3-200 (3.2.27-2 =&gt; 3.4.0-1~bpo9+1)
&nbsp; libnl-route-3-200 (3.2.27-2 =&gt; 3.4.0-1~bpo9+1)
&nbsp; libpam-systemd (232-25+deb9u12 =&gt; 241-5~bpo9+1)
&nbsp; libsqlite3-0 (3.16.2-5+deb9u1 =&gt; 3.27.2-3~bpo9+1)
&nbsp; mtr-tiny (0.87-1 =&gt; 0.92-2~bpo9+1)
&nbsp; openvpn (2.4.0-6+deb9u3 =&gt; 2.4.7-1~bpo9+1)
&nbsp; rsyslog (8.24.0-1 =&gt; 8.1901.0-1~bpo9+1)
</pre><h2>Known issues</h2><ul><li>[DPI] - Sometimes DPI is reporting wrong rx/tx counters</li><li>[Offloading] - L2TP IPSec traffic is not being offloaded on <em>Mediatek-based</em> routers (<strong>ER-X</strong>, <strong>ER-X-SFP,</strong> <strong>EP-R6</strong>)</li><li>[Offloading] - VLAN traffic is not being offloaded on <strong>ER-12 </strong></li></ul><h2>Additional information</h2><p>EdgeRouter firmware can be installed via&nbsp;<strong>CLI</strong>,&nbsp;<strong>WebGUI</strong>&nbsp;or&nbsp;<strong>UNMS</strong>. Detailed installation instruction is available&nbsp;<a href="https://help.ubnt.com/hc/en-us/articles/205146110-EdgeRouter-How-to-Upgrade-the-EdgeOS-Firmware" rel="noopener noreferrer" target="_blank">here</a>.</p><pre class="ql-syntax" spellcheck="false">Checksums:
&nbsp;ER-e50.v2.0.9-hotfix.2.5402463.tar&nbsp;&nbsp; - md5:b3d9584d41fe2acd66353962938aa5bd - sha256:728610ebd60f5eea4781709fc98ada8d5469fe3e49480e1e05350258aef599dc
&nbsp;ER-e100.v2.0.9-hotfix.2.5402463.tar&nbsp; - md5:b588aabac521697eb88ea5059e04809f - sha256:094f1c7b286f2c9ba5bd38b901a68d20e7baf8d7cbf2141fce07ce0925d0b53d
&nbsp;ER-e300.v2.0.9-hotfix.2.5402463.tar&nbsp; - md5:0b7d85809654e550c64d41befee61b11 - sha256:b680829d1bbcfb1164ab6cb95db9b71bda90b035a72964f4417a3153c79a3771
&nbsp;ER-e200.v2.0.9-hotfix.2.5402463.tar&nbsp; - md5:e7775c855a8647daeae8d9c85b054cbc - sha256:9ed8015a8a89e8ffe60b7fe6a44dc5503b25a437647ae9abad49fd88a185e1ac
&nbsp;ER-e1000.v2.0.9-hotfix.2.5402463.tar - md5:37233acf515e7171935820f57f35062c - sha256:4b223450743114ad8c21bea1cb9ab6410e44e8f35f7267ec0fd9dcb9b5b153e7

</pre>]]></description>
            <link>https://community.ui.com/releases/EdgeMAX-EdgeRouter-Firmware-v2-0-9-hotfix-2-security-update-v2-0-9-hotfix-2/f4f313e2-c6a4-4a15-8f16-7140795289c2</link>
            <guid isPermaLink="false">f4f313e2-c6a4-4a15-8f16-7140795289c2</guid>
            <category><![CDATA[edgemax]]></category>
            <category><![CDATA[routing]]></category>
            <dc:creator><![CDATA[UI-afomins]]></dc:creator>
            <pubDate>Fri, 11 Jun 2021 05:52:39 GMT</pubDate>
        </item>
        <item>
            <title><![CDATA[Security Advisory Bulletin 018]]></title>
            <description><![CDATA[<h2>Overview</h2><p>First Published: May 18, 2021</p><p>Version: 1.0</p><p>Revision: 1.0</p><p>&nbsp;</p><p><strong>Summary</strong></p><p>A vulnerability found in EdgeMAX EdgeRouter <strong>V2.0.9 and earlier </strong>could allow a malicious actor to execute a man-in-the-middle (MitM) attack during a firmware update. This vulnerability is fixed in <strong>EdgeMAX EdgeRouter V2.0.9-hotfix.1 and later</strong>.</p><p>&nbsp;</p><p><strong>Affected Products:</strong></p><p>All EdgeMAX EdgeRouters</p><p><br></p><p><strong>Mitigation:</strong></p><p>Update the EdgeMax EdgeRouter to <strong>V2.0.9-hotfix.1 or later</strong>.</p><p>&nbsp;</p><p><strong>Impact:</strong></p><p><strong>CVSS v3.0 Severity and Metrics:</strong></p><p><strong>Base Score: </strong>7.5 High</p><p><strong>Vector:&nbsp;</strong></p><p><a href="https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" rel="noopener noreferrer" target="_blank"><strong>CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H</strong></a></p><p><strong>CVE: </strong><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22909" rel="noopener noreferrer" target="_blank">CVE-2021-22909</a></p><p>&nbsp;</p><p><strong>Reference Links:</strong></p><p><a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Firmware-v2-0-9-hotfix-1-security-update-2-0-9-hotfix-1/fff093d6-8a3b-4f3b-a68e-f8ac5d8dc9ef" rel="noopener noreferrer" target="_blank">https://community.ui.com/releases/EdgeMAX-EdgeRouter-Firmware-v2-0-9-hotfix-1-security-update-2-0-9-hotfix-1/fff093d6-8a3b-4f3b-a68e-f8ac5d8dc9ef</a></p>]]></description>
            <link>https://community.ui.com/releases/Security-Advisory-Bulletin-018-018/cfa1566b-4bf8-427b-8cc7-8cffba3a93a4</link>
            <guid isPermaLink="false">cfa1566b-4bf8-427b-8cc7-8cffba3a93a4</guid>
            <category><![CDATA[edgemax]]></category>
            <category><![CDATA[routing]]></category>
            <category><![CDATA[security]]></category>
            <dc:creator><![CDATA[UI-Marcus]]></dc:creator>
            <pubDate>Tue, 18 May 2021 14:01:30 GMT</pubDate>
        </item>
        <item>
            <title><![CDATA[EdgeMAX EdgeRouter Firmware v2.0.9-hotfix.1 security update]]></title>
            <description><![CDATA[<h2>Overview</h2><p>The&nbsp;<strong>ER-X</strong>/<strong>ER-X-SFP</strong>/<strong>ER-10X</strong>/<strong>EP-R6</strong>&nbsp;has more limited storage, and in some cases, an upgrade may fail due to not enough space. If this happens, remove the old backup image first (using <code>delete system image</code> CLI command, see&nbsp;<a href="https://help.ubnt.com/hc/en-us/articles/205146110-EdgeMAX-Upgrading-EdgeOS-firmware" rel="noopener noreferrer" target="_blank">here</a>&nbsp;for more details) before doing an upgrade.</p><p>More details can be found in the release notes below. Please give it a try if you are interested in the new features/changes to help us test them so that we can get the release out sooner! Thanks very much!</p><h2>Improvements</h2><p>n/a</p><h2>Bugfixes</h2><ul><li>[Security/DNS] - Fix <a href="https://www.jsof-tech.com/disclosures/dnspooq/" rel="noopener noreferrer" target="_blank">dnspooq</a> vulnerabilities in <code>dnsmasq</code></li><li>[Security/Upgrade] - Remove <code>-k</code> (aka <code>--insecure</code>) flag when downloading firmware update via CLI with <code>curl</code></li><li>[SNMP] - Backport multiple <code>snmpd</code> memory leak fixes from upstream (<a href="https://github.com/net-snmp/net-snmp/commit/ddc6c6fa08747beb74663d3efbf73843e45637db" rel="noopener noreferrer" target="_blank">1st</a>, <a href="https://github.com/net-snmp/net-snmp/commit/5846564f5be46e0e362be894d4cb57be383c5b3d" rel="noopener noreferrer" target="_blank">2nd</a> and <a href="https://sourceforge.net/p/net-snmp/bugs/2788/" rel="noopener noreferrer" target="_blank">3rd</a>)</li><li>[UNMS] - Fix memory leak in <code>udapi-bridge</code> process when UNMS is enabled</li></ul><p>Upgraded following Debian packages:</p><pre class="ql-syntax" spellcheck="false">    &nbsp;&nbsp;dnsmasq (2.79 =&gt; 2.83)
</pre><h2>Known issues</h2><ul><li>[DPI] - Sometimes DPI is reporting wrong rx/tx counters</li><li>[Offloading] - L2TP IPSec traffic is not being offloaded on <em>Mediatek-based</em> routers (<strong>ER-X</strong>, <strong>ER-X-SFP,</strong> <strong>EP-R6</strong>)</li><li>[Offloading] - VLAN traffic is not being offloaded on <strong>ER-12 </strong></li></ul><p><br></p><ul><li>[dnsmasq] - latest <code>dnsmasq v2.83</code> has regression that causes DNS request to be resent during heavy load (details <a href="http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2021q1/014640.html" rel="noopener noreferrer" target="_blank">here</a>). We will fix this issue in upcoming <strong>v2.0.9-hotfix.2</strong> firmware update:</li></ul><blockquote>The symptoms are random log messages reporting "failure to send packet" and the DNS query associated with this is lost.</blockquote><blockquote>Retries of the query do not fail, so the <strong>operational effect of this is minimal.</strong></blockquote><blockquote>To trigger the bug, dnsmasq:</blockquote><blockquote>1) has to be under fairly heavy load,</blockquote><blockquote>2) and be configured for a mixture or IPv4 and IPv6 upstream DNS servers</blockquote><blockquote>3) or, possibly, be using --bind-interfaces.</blockquote><p><br></p><ul><li>[dnsmasq] - shell command <code>dnsmasq --version</code> is reporting old <code>v2.79</code> version instead of <code>v2.83</code>. This is a pure cosmetic issue, please ignore it - <code>dnsmasq</code> was indeed upgraded to <code>v2.83</code>. This issue will be fixed in <code>v2.0.9-hotfix.2</code> firmware</li><li>[sudo] - Known <strong>CVE-2021-3156</strong> <code>sudo</code> vulnerability is present in <code>v2.0.9-hotfix.1</code> but it <strong>can not be exploited</strong> because non-privileged users do not have shell account. Nevertheless we will patch <code>sudo </code>in upcoming <code>v2.0.9-hotfix.2</code> firmware</li></ul><h2>Additional information</h2><p>EdgeRouter firmware can be installed via&nbsp;<strong>CLI</strong>,&nbsp;<strong>WebGUI</strong>&nbsp;or&nbsp;<strong>UNMS</strong>. Detailed installation instruction is available&nbsp;<a href="https://help.ubnt.com/hc/en-us/articles/205146110-EdgeRouter-How-to-Upgrade-the-EdgeOS-Firmware" rel="noopener noreferrer" target="_blank">here</a>.</p><p>Checksums:</p><pre class="ql-syntax" spellcheck="false">ER-e50.v2.0.9-hotfix.1.5371034.tar    md5:532ae3a57a52510422c153fa94d4c223  sha256:0573071f39afa85ac5ba6a0ae2aaf382a0d5674a632a16c787b2ac7d342d7bf6
ER-e100.v2.0.9-hotfix.1.5371034.tar   md5:1ee86f529f1c198dabb40813cb0ad080  sha256:40c2c652c991a713a04ee2a8622a746143f981f067b394abc21f945e7be62c00
ER-e200.v2.0.9-hotfix.1.5371034.tar   md5:57e99bf850ae7465b9a70f92de414673  sha256:97ea94dd4fedf2d2f0cda071fe87b3ea2593049c43e834d941edb0c41a9a34ab
ER-e300.v2.0.9-hotfix.1.5371035.tar   md5:9544dc857b41be812bb1fa38c707a695  sha256:11018fa69141ce9e03078adfa2c2d3fd005cc4a27a1c4b023b096fc3f1d7f6d6
ER-e1000.v2.0.9-hotfix.1.5371034.tar  md5:23e8f11a8d0ea14b4fdc4ef31b4e7036  sha256:db5adfc565ee55992ffc98dda898b51e557799866e455b4fffe1b3d0fe259835
</pre>]]></description>
            <link>https://community.ui.com/releases/EdgeMAX-EdgeRouter-Firmware-v2-0-9-hotfix-1-security-update-2-0-9-hotfix-1/fff093d6-8a3b-4f3b-a68e-f8ac5d8dc9ef</link>
            <guid isPermaLink="false">fff093d6-8a3b-4f3b-a68e-f8ac5d8dc9ef</guid>
            <category><![CDATA[edgemax]]></category>
            <category><![CDATA[routing]]></category>
            <dc:creator><![CDATA[UI-afomins]]></dc:creator>
            <pubDate>Tue, 02 Feb 2021 11:55:42 GMT</pubDate>
        </item>
        <item>
            <title><![CDATA[EdgeMAX EdgeRouter Firmware v2.0.9]]></title>
            <description><![CDATA[<h2>Overview</h2><p>The&nbsp;<strong>ER-X</strong>/<strong>ER-X-SFP</strong>/<strong>ER-10X</strong>/<strong>EP-R6</strong>&nbsp;has more limited storage, and in some cases, an upgrade may fail due to not enough space. If this happens, remove the old backup image first (using <code>delete system image</code> CLI command, see&nbsp;<a href="https://help.ubnt.com/hc/en-us/articles/205146110-EdgeMAX-Upgrading-EdgeOS-firmware" rel="noopener noreferrer" target="_blank">here</a>&nbsp;for more details) before doing an upgrade.</p><p>More details can be found in the release notes below. Please give it a try if you are interested in the new features/changes to help us test them so that we can get the release out sooner! Thanks very much!</p><h2>Improvements</h2><ul><li>Add <strong>anonymous crash reporting</strong> and <strong>analytics reporting</strong> which are <strong>disabled by default</strong>.</li></ul><p>If you wish to toggle these features then you need to run following commands in CLI:</p><pre class="ql-syntax" spellcheck="false">configure
set system analytics-handler send-analytics-report true/false
set system crash-handler send-crash-report true/false
commit
save
</pre><p><strong>NOTE</strong>:<strong> </strong>We would appreciate if you choose to enable <em><u>crash-reporting</u></em> &amp; <em><u>analytics</u></em> as (a) All data is 100% <strong>anonymized</strong> and does not contain sensitive information (i.e. no IPs, no MACs and no keys/passwords) (b) This <strong>anonymized </strong>data help us make EdgeOS better 💪 because it is very valuable source of information as to what routing functionality is misbehaving and how ERs are being used in real-life environment (e.g. CPU load, throughout, number of interface, number of routes, etc...)</p><p><br></p><ul><li>Add <strong>firmware upgrade button</strong> in WebGUI. This button will show indication when new stable firmware is available. Upgrade process will be initiated upon pressing this button.</li></ul><img src="https://img.community.ui.com/9aedec41-6d70-4794-b86d-318628d36126/releases/d75f346d-d734-4026-97a8-7b2d5cc4e079/281abfba-f922-4074-84b6-310f1a65d0e3" style="width: 100%;object-fit: cover;height: 205px" /><p><br></p><ul><li>Add popup window to WebGUI where admin is being asked to <strong>allow</strong> or <strong>deny﻿</strong> analytics&amp;crash-reporting. Description and data samples available here -&gt; <a href="https://help.ui.com/hc/en-us/articles/360051176734" rel="noopener noreferrer" target="_blank">https://help.ui.com/hc/en-us/articles/360051176734</a></li></ul><img src="https://img.community.ui.com/9aedec41-6d70-4794-b86d-318628d36126/releases/d75f346d-d734-4026-97a8-7b2d5cc4e079/795d4468-38f6-4a75-8cde-987c05bc0d91" style="width: 100%;object-fit: cover;height: 205px" /><p><br></p><ul><li>Add <strong>"Factory Reset"</strong> button to WebGUI:</li></ul><img src="https://img.community.ui.com/9aedec41-6d70-4794-b86d-318628d36126/releases/d75f346d-d734-4026-97a8-7b2d5cc4e079/fa5e655e-9739-4458-b2f5-98437a147e81" style="width: 100%;object-fit: cover;height: 205px" /><p><br></p><ul><li>Add new CLI command <code>add system image</code> to automatically download and install latest stable firmware:</li></ul><pre class="ql-syntax" spellcheck="false">ubnt@erx:~$ add system image
Fetching version number of latest firmware... ok
&nbsp;&gt; version : v2.0.8
&nbsp;&gt; url&nbsp;&nbsp;&nbsp;&nbsp; : https://fw-download.ubnt.com/data/e50/df20-edgerouter-2.0.8-d52c6e913e2246de9f5f79a15291fba2.tar
&nbsp;&gt; md5&nbsp;&nbsp;&nbsp;&nbsp; : 2b6b7a8ceb87371d81a6549d1cab61fe
&nbsp;&gt; state&nbsp;&nbsp; : up-to-date

Current firmware is already up-to-date (!!!)

Version [v2.0.8.5247496.191120.1124-1] is about to be replaced
Are you sure you want to replace old version? (Yes/No) [Yes]: 
</pre><p><br></p><ul><li><strong>Decrease size of firmware image</strong> by removing dependency on <code>libxml</code> and excluding it -&gt; size of firmware image shrank by ~10Mb.</li></ul><p><strong>NOTE</strong>: if you install some 3rd party software that depends on <code>libxml</code> then you need to install <code>libxml</code> yourself</p><p><br></p><ul><li><strong>Reduce RAM usage</strong> by disabling <em><u>systemd journaling</u></em> (discussed <a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Beta-Firmware-v2-0-9-beta-2/bc4303d9-65f6-44ac-a293-b6b7f776f28c#comment/71e8d0da-32f4-47fb-a2c1-694d0b9ac6f9" rel="noopener noreferrer" target="_blank">here</a>) and add new config entries to control <em><u>systemd-journaling</u></em> if necessary:</li></ul><pre class="ql-syntax" spellcheck="false">set system systemd journal ...
</pre><p><br></p><ul><li>Add new L2TP VPN <strong><em><u>remote access client interface</u></em></strong> that establishes VPN connection to external L2TP remote access VPN server. For instance following example creates <code>l2tpc0</code> Point-to-Point interface towards to L2TP server <code>192.168.11.1</code>:</li></ul><p>Create <code>l2tpc0</code> interface:</p><pre class="ql-syntax" spellcheck="false">set interfaces l2tp-client l2tpc0 authentication user-id ubnt
set interfaces l2tp-client l2tpc0 authentication password ubnt
set interfaces l2tp-client l2tpc0 mtu 1400                   
set interfaces l2tp-client l2tpc0 server-ip 192.168.11.1
set interfaces l2tp-client l2tpc0 require-ipsec
</pre><p>Bind <code>l2tpc0</code> interface to IPSec tunnel:</p><pre class="ql-syntax" spellcheck="false">set vpn ipsec esp-group FOO0 pfs disable
set vpn ipsec esp-group FOO0 mode transport
set vpn ipsec esp-group FOO0 proposal 1 encryption aes256
set vpn ipsec esp-group FOO0 proposal 1 hash sha1        
set vpn ipsec ike-group FOO0 dead-peer-detection action restart
set vpn ipsec ike-group FOO0 proposal 1 encryption aes128      
set vpn ipsec ike-group FOO0 proposal 1 hash sha1         
set vpn ipsec site-to-site peer 192.168.11.1 authentication mode pre-shared-secret
set vpn ipsec site-to-site peer 192.168.11.1 authentication pre-shared-secret ubnt
set vpn ipsec site-to-site peer 192.168.11.1 ike-group FOO0
set vpn ipsec site-to-site peer 192.168.11.1 local-address default
set vpn ipsec site-to-site peer 192.168.11.1 tunnel 1 esp-group FOO0    
set vpn ipsec site-to-site peer 192.168.11.1 tunnel 1 local port l2tp
set vpn ipsec site-to-site peer 192.168.11.1 tunnel 1 protocol udp   
set vpn ipsec site-to-site peer 192.168.11.1 tunnel 1 remote port l2tp
</pre><p><br></p><ul><li>Enable <code>connmark</code> plugin in <code>strongswan</code> to allow connection from multiple L2TP-VPN clients <strong>from same NAT</strong> (discussed <a href="https://community.ubnt.com/t5/EdgeMAX/Mulitple-remote-access-L2TP-ipsec-VPN-client-behind-the-same-NAT/m-p/1493835#M99637" rel="noopener noreferrer" target="_blank">here</a>). By default <code>connmark</code> is disabled and needs to be enabled from CLI with following command:</li></ul><pre class="ql-syntax" spellcheck="false">set vpn l2tp remote-access allow-multiple-clients-from-same-nat enable
</pre><p><strong>NOTE:</strong><code>connmark</code> is disabled by default because we discovered two issues when it's enabled:</p><ol><li><code>connmark</code> does not work properly if NAT is<strong> not</strong> configured</li><li><code>connmark</code> does not work properly if TrafficShaping is configured in UNMS</li></ol><p><br></p><ul><li>[UNMS] - Add support for "<em><u>unlimited queues</u></em>" and "<em><u>dynamic wan interface</u></em>" in UNMS QoS</li><li>[DPI] - Upgrade DPI signature database to version 1.564</li><li>[Performance] Improved forwarding performance on <strong>all</strong> ER models when offloading is disabled ---&gt; <strong>+30%</strong> in simple NAT scenario, <strong>+10%</strong> in QoS/NetFlow scenario when comparing with <strong>v2.0.8</strong>.</li><li>[Performance] Improved IPsec performance on <strong>ER-X</strong>/<strong>ER-X-SFP</strong>/<strong>ER-10X/EP-R6</strong> when offloading is enabled ---&gt; <strong>+10%</strong> when comparing with <strong>v2.0.8</strong>. Discussed <a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Beta-Firmware-v2-0-8-beta-2/e31d4ae5-8728-41ce-8750-c9514040a95c#comment/83bfe80f-7932-4dbb-b49a-33b25bbd1c79l" rel="noopener noreferrer" target="_blank">here</a></li><li>[PPPoE] - Increase PPPoE client IP pool size from 256 to 1024</li><li>[CLI] - Update CLI welcome message to make it consistent with other Edge*** products</li><li>[Security] - Now <em><u>current config</u></em>, <em><u>private user files</u></em> and <em><u>backup firmware image</u></em> will be <strong>permanently</strong> deleted when doing factory reset via CLI/WebGUI/UNMS. Previously <strong>backup firmware</strong> image used to survive factory-reset</li></ul><h2>Bugfixes</h2><ul><li>[WebGUI] - Fix bug when WebGUI showed wrong RX/TX counters on <code>eth0~eth7</code> when ipv4 offloading is enabled</li><li>[WebGUI] - Fix regression from <code>v2.0.0</code> when bandwidth measurement tool in WebGUI did not work at all. Discussed <a href="https://community.ubnt.com/t5/EdgeRouter/EdgeMAX-EdgeRouter-software-version-v2-0-0-has-been-released/m-p/2625133#M235502" rel="noopener noreferrer" target="_blank">here</a></li><li>[WebGUI] - Fix bug in WebGUI when UNMS status is stuck in "<em><u>connecting</u></em>" state forever. Discussed <a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Beta-Firmware-v2-0-9-beta-1/41cb4feb-b16d-4eb3-ba2c-91e8493309a1#comment/0f47a550-5fee-4464-ac01-c8162ba81ed8" rel="noopener noreferrer" target="_blank">here</a></li><li>[WebGUI] - Fix bug in WebGUI when some tools did not show any output (ping, trace, log, capture, bandwidth). Discussed <a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Firmware-v2-0-8/4d9cfba7-4a5a-403e-a5c8-26679d58620f#comment/9ca884ac-fac6-4176-b75d-5fbff2a71ab8" rel="noopener noreferrer" target="_blank">here</a> and <a href="https://community.ui.com/questions/ER-X-2-0-8-Empty-System-Log-Monitor/3c2dbd29-80f5-46c6-9e4b-7fa92f5e7739" rel="noopener noreferrer" target="_blank">here</a></li><li>[WebGUI] - Fix bug when WebGUI randomly crashed because <code>lighttpd</code> was stuck with 100% CPU load. <code>lighttpd</code> was upgraded to <code>v1.4.55</code>. Discussed <a href="https://community.ui.com/questions/Edgerouter-WebUI-unresponsive/41ae73bb-74d1-404e-afe8-b98a456045d3" rel="noopener noreferrer" target="_blank">here</a></li><li>[WebGUI] - Fix bug in WebGUI when firewall stats were empty during first 30 seconds. Discussed <a href="https://community.ui.com/questions/v2-0-8-No-Firewall-Stats-Available/4af6904a-ae08-4948-ba92-7cca398ab22e" rel="noopener noreferrer" target="_blank">here</a></li><li>[UNMS] - Fix bug when QoS could not disabled from UNMS</li><li>[UNMS] - Strip 3rd party DEB packages from backup file when making ER backup from UNMS. We did this to reduce size of backup files because UNMS makes them very frequently.</li><li>[UNMS] - Fix wrong LED color indication when UNMS is not configured</li><li>[UNMS] - Fix bug when UNMS sometimes failed to perform initial connection with ER</li><li>[UNMS] - Fix bug when UNMS QoS crashed when binding to <em><u>missing</u></em> PPPoE interfaces</li><li>[UNMS] - Fix memory leak in <code>udapi-bridge</code> process when ER is connected to UNMS. Discussed <a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Beta-Firmware-v2-0-9-beta-3/b3c442e8-fd12-4648-b52f-93e61f1ca1ff#comment/b44af8aa-1770-4ec7-afd8-4a602c2d63c5" rel="noopener noreferrer" target="_blank">here</a></li><li>[UNMS] - Fix rare config mis-synchronization between ER and UNMS causing random errors when configuring via UNMS</li><li>[SFP] - Fix bug when SFP port failed to process packets after reboot. Discussed <a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Firmware-v2-0-8/4d9cfba7-4a5a-403e-a5c8-26679d58620f#comment/8c43e733-fb6a-4d6b-988f-d510589609aa" rel="noopener noreferrer" target="_blank">here</a></li><li>[SFP] - Fix bug when some SFP modules were mistakenly reporting tx error</li><li>[SFP] - Fix bug when SFP interface stops working when Ethernet interface loses link on <strong>ER-12</strong></li><li>[SFP] - Fix bug when stats in WebGUI stall if SFP module is misbehaving and responding with garbage instead of valid sfp data. Discussed <a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Beta-Firmware-v2-0-9-beta-5/c6a139a3-9383-43f8-9f18-bd386c9fe2aa" rel="noopener noreferrer" target="_blank">here</a></li><li>[Offloading] - Fix random lock-ups when hwnat offloading is enabled on <strong>ER-X</strong>/<strong>ER-X-SFP</strong>. Discussed <a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Beta-Firmware-v2-0-8-beta-1/d00bfd46-59b7-4304-8fdc-d7331134c954#comment/398ae591-096e-428e-bfe9-0e56d1012735" rel="noopener noreferrer" target="_blank">here</a> and <a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Firmware-v2-0-8/4d9cfba7-4a5a-403e-a5c8-26679d58620f#comment/aeb6b1cb-53c2-468c-b268-e134064ec688" rel="noopener noreferrer" target="_blank">here</a></li><li>[Packages] - Restore builtin <code>etherwake</code> package that was removed since <strong>v2.0.0 </strong>firmware</li><li>[PPPoE/L2TP/PPP] - Fix buffer overflow vulnerability in <code>pppd</code> daemon (<strong>CVE-2020-8597</strong>)</li><li>[OSPF] - Fix bug when OSPF neighbors disappear after interface flap if OSPF network has /32 mask. Discussed <a href="https://community.ubnt.com/t5/EdgeRouter/EdgeMAX-EdgeRouter-software-version-v1-10-9-has-been-released/m-p/2724344#M245776" rel="noopener noreferrer" target="_blank">here</a></li><li>[CLI] - Fix bug when <code>add system image</code> CLI command did not show "<em><u>yes/no</u></em>" prompt if there's no backup firmware image. Discussed <a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Beta-Firmware-v2-0-9-beta-1/41cb4feb-b16d-4eb3-ba2c-91e8493309a1#comment/3a898ff0-d522-40f4-85e0-1ac07a766bc8" rel="noopener noreferrer" target="_blank">here</a></li><li>[CLI] - Fix bug when shell command <code>switch pvid dump</code> crashes on <strong>ER-X</strong>. Discussed <a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Beta-Firmware-v2-0-9-beta-2/bc4303d9-65f6-44ac-a293-b6b7f776f28c#comment/62b0565f-b3d6-4330-a125-f851bde2d7eb" rel="noopener noreferrer" target="_blank">here</a></li><li>[BGP] - Fix bug when blocked BGP prefix leaked to neighbors when committing <strong>large </strong>BGP config. Discussed <a href="https://community.ubnt.com/t5/EdgeRouter/EdgeRouter-Infinity-BGP-peer-group-bug/m-p/2577736#M230230" rel="noopener noreferrer" target="_blank">here</a> and <a href="https://community.ubnt.com/t5/EdgeRouter/BGP-route-map-export-ignored-during-boot/m-p/2695753#M242907" rel="noopener noreferrer" target="_blank">here</a></li><li>[SNMP] - Fix "<em><u>unknown notification OID</u></em>" and "<em><u>Unknown token: monitor</u></em>" errors in syslog when configuring SNMP. Discussed <a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Beta-Firmware-v2-0-8/d3337873-01a0-43e7-9724-26744058484b#comment/de9fb004-94ac-45e5-b295-07f7ca47a932" rel="noopener noreferrer" target="_blank">here</a></li><li>[SNMP] - Fix bug when SNMP flooded <code>"error on subcontainer ia_addr insert"</code> errors in syslog. Discussed <a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Beta-Firmware-v2-0-9-beta-2/bc4303d9-65f6-44ac-a293-b6b7f776f28c#comment/bd7e60f3-c7d9-4fb5-9d57-1deab88c2fb5" rel="noopener noreferrer" target="_blank">here</a></li><li>[SNMP] - Fix SNMP flooding "<em><u>cannot get stats strings information for interface</u></em>" error to syslog on <strong>ER-X</strong>. Discussed <a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Beta-Firmware-v2-0-9-beta-3/b3c442e8-fd12-4648-b52f-93e61f1ca1ff#comment/8b1b76fd-0f75-440e-9e8e-6c29379e6f57" rel="noopener noreferrer" target="_blank">here</a></li><li>[LoadBalancing] - Fix bug when Load Balancing randomly failed if WAN interface acquired new DHCP address. Discussed <a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Beta-Firmware-v2-0-9-beta-1/41cb4feb-b16d-4eb3-ba2c-91e8493309a1#comment/a421f908-61e1-4613-af97-9348a374b9fa" rel="noopener noreferrer" target="_blank">here</a></li><li>[PPPoE] - Fix RCE vulnerability in <code>pppoe-server</code> when using custom <code>radius-disconnect</code> script. Introduced <a href="https://community.ui.com/releases/EdgeMax-software-release-v1-4-0-1-4-0/bf6061c3-52ea-4d61-a900-ec70867e19c7" rel="noopener noreferrer" target="_blank">here</a> and discussed <a href="https://splynx.com/2061/ubiquiti-edgerouters-pppoe-radius-support/" rel="noopener noreferrer" target="_blank">here</a></li><li>[PPPoE] - Fixed confusing "<code>PADT: Generic-Error: xxxx</code>" syslog message when PPPoE client disconnected. Discussed <a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Beta-Firmware-v2-0-9-beta-2/bc4303d9-65f6-44ac-a293-b6b7f776f28c#comment/9e036278-78dd-4c22-9703-3eb5c61aaa64" rel="noopener noreferrer" target="_blank">here</a></li><li>[DDNS] - Fix potential DDNS config <em><u>disclosure</u></em> vulnerability if multiple Dynamic DNS providers are configured</li><li>[PPTP] - Don't load <code>nf_nat_pptp</code> module during boot unless it it is really used</li><li>[IGMP] - Upgraded <code>igmp-proxy</code> to fix multiple IPTV freeze/disconnect issues</li><li>[System] - Add <code>ethtool</code> support for <strong>ER-X</strong>/<strong>ER-X-SFP</strong>/<strong>ER-10X</strong> models</li><li>[VPN] - Fix bug when L2TP-VPN daemon randomly crashed when WAN interface updated DHCP lease. Discussed <a href="https://community.ui.com/questions/L2PT-IPSec-VPN-Server-randomly-stops-working-after-a-few-hours/4ab3d9c1-6fe1-4135-a06d-75651ad077e9" rel="noopener noreferrer" target="_blank">here</a> and <a href="https://community.ui.com/questions/L2PT-IPSec-VPN-Server-randomly-stops-working-after-a-few-hours/4ab3d9c1-6fe1-4135-a06d-75651ad077e9" rel="noopener noreferrer" target="_blank">here</a></li><li>[IPv6] - Fix bug when <code>radvd</code> failed when loading configuration with many VLANS (10+). Discussed <a href="https://community.ubnt.com/t5/EdgeRouter/EdgeMAX-EdgeRouter-software-version-v2-0-3-has-been-released/m-p/2801786#M253396" rel="noopener noreferrer" target="_blank">here</a></li><li>[IPv6] - Fix bug when PD wont start if prefix6 range is outside of declared subnet. Backported FreeBSD patch from <a href="https://svnweb.freebsd.org/ports/head/net/isc-dhcp43-server/files/patch-server_confpars.c?view=markup&amp;pathrev=392293" rel="noopener noreferrer" target="_blank">here</a></li><li>[IPv6] - Add static mapping feature for IPv6 PD so that service dhcp-statefull could have statically mapped hosts. Discussed <a href="https://community.ui.com/questions/IPv6-and-DHCHv6-Stateful-IP-Allocation-Not-Working/f6b59791-3c5b-49fa-8a23-05efa40a41cb" rel="noopener noreferrer" target="_blank">here</a> and <a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Beta-Firmware-v2-0-9-beta-4/a02f0a1e-40b7-4d21-8838-618b291e0732#comment/961068f8-3f76-420d-a478-d40a8f7875e9" rel="noopener noreferrer" target="_blank">here</a></li><li>[OSPFv3] - Fix regression from <code>v2.0.7</code> when OSPFv3 stopped adding received routes to RIB. Discussed <a href="https://community.ui.com/questions/OSPFv3-not-working-with-EdgeOS-v1-10-10/62239440-77f2-4a14-b6ca-c3bffa750408#answer/9593a218-51b2-4dfa-910b-c185c3d6b4ae" rel="noopener noreferrer" target="_blank">here</a></li><li>[OSPFv3] - Fix bug that caused failure when redistributing OSPFv3 routes via BGP. Discussed <a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Beta-Firmware-v2-0-9-rc-2-v2-0-9-rc-2/31ecc611-3cf0-432a-a614-e6fb9ee83796#comment/6253d072-8a0f-496f-b1c1-ba9ec06de7b2" rel="noopener noreferrer" target="_blank">here</a></li><li>[QoS] - Fix bug when <code>burst-size</code> was causing bad performance when configured in UNMS</li><li>[Interfaces] - Add missing firewall config for <code>switch0.pppoe</code> and <code>switch0.vif.pppoe</code> interfaces. Discussed <a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Firmware-v2-0-8/4d9cfba7-4a5a-403e-a5c8-26679d58620f#comment/409b5468-ca26-4752-a784-8e0dd8b2e42f" rel="noopener noreferrer" target="_blank">here</a> and <a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Beta-Firmware-v2-0-9-beta-2/bc4303d9-65f6-44ac-a293-b6b7f776f28c#comment/be69bb01-1059-45aa-89b5-680f3ee047c1" rel="noopener noreferrer" target="_blank">here</a></li><li>[Interfaces] - Fix bug when VLAN interface with MTU &lt;1280 triggers <strong>"Commit Failed"</strong> error</li><li>[Interfaces] - Fix bug when packets with wrong MAC leaked to WAN if offloading is enabled on <strong>ER-X. </strong>Discussed <a href="https://community.ubnt.com/t5/EdgeRouter/EdgeRouter-X-SFP-leaking-MAC-addresses/td-p/1884107" rel="noopener noreferrer" target="_blank">here</a></li><li>[Interfaces] - Fix bug when wrong TX/RX counters were reported on switched port on <strong>ER-12</strong>/<strong>ER-12P</strong></li><li>[Interfaces] - Allow deleting non existing address from config if it disappeared from kernel. Discussed <a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Beta-Firmware-v2-0-9-beta-4/a02f0a1e-40b7-4d21-8838-618b291e0732#comment/683043cd-5259-4bcf-86d6-8b2e77947cf1" rel="noopener noreferrer" target="_blank">here</a></li><li>[Routing] - Fix bug when <strong>all</strong> routing daemons (<code>bgp</code>, <code>ospf</code>, <code>rip</code>, <code>ripng</code>...) randomly &amp; permanently die. This issue was randomly observed while creating/deleting 100+ PPPoE interfaces.</li><li>[Routing] Added Ethernet driver patch from Cavium that <strong>fixes packet reordering</strong> with 4.x kernel. This should improve performance of network services that are sensitive to UDP packet reordering (e.g. VoIP and Video streaming)</li><li>[TechSupport] - Add more LoadBalancing debug info to tech-support file</li><li>[SSH-Recovery] - Fix bug when setting VLAN interfaces in <code>service ssh-recovery listen-on</code> caused config corruption after reboot</li><li>[LED] - Fix bug when LED light was stuck in WHITE color forever. Discussed <a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Beta-Firmware-v2-0-9-beta-2/bc4303d9-65f6-44ac-a293-b6b7f776f28c#comment/d26b2e69-1885-4927-95b0-c06689974538" rel="noopener noreferrer" target="_blank">here</a></li><li>[DHCP] - Fix bug when same hostname could not be statically-mapped in different subnets for IPv4/IPv6 DHCP servers. Discussed <a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Beta-Firmware-v2-0-9-beta-4/a02f0a1e-40b7-4d21-8838-618b291e0732#comment/961068f8-3f76-420d-a478-d40a8f7875e9" rel="noopener noreferrer" target="_blank">here</a></li><li>[DHCP] - Fix bug in DHCP server when <code>dhcp-boot</code> option of first subnet was applied to all networks</li><li>[PoE] - Fix bug when PoE on <code>eth9</code> on <strong>ER-10X</strong> remained enabled after doing factory reset</li><li>[UPnP] - Backport <strong>CVE-2019-12111</strong> that fixes DDoS attack in <code>miniupnpd</code> . Discussed <a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Beta-Firmware-v2-0-9-beta-2/bc4303d9-65f6-44ac-a293-b6b7f776f28c#comment/07994756-2453-4d57-8ea9-7707670880ac" rel="noopener noreferrer" target="_blank">here</a></li></ul><p><br></p><ul><li>Upgraded following Debian packages:</li></ul><pre class="ql-syntax" spellcheck="false">    &nbsp;&nbsp;apt (1.4.9 =&gt; 1.4.10)
    &nbsp;&nbsp;apt-transport-https (1.4.9 =&gt; 1.4.10)
    &nbsp;&nbsp;base-files (9.9+deb9u11 =&gt; 9.9+deb9u13)
&nbsp;    &nbsp;ca-certificates (20161130+nmu1+deb9u1 =&gt; 20200601~deb9u1)
&nbsp;    &nbsp;curl (7.52.1-5+deb9u9 =&gt; 7.52.1-5+deb9u10)
&nbsp;    &nbsp;dbus (1.10.28-0+deb9u1 =&gt; 1.10.32-0+deb9u1)
&nbsp;    &nbsp;libapt-pkg5.0 (1.4.9 =&gt; 1.4.10)
&nbsp;    &nbsp;libcurl3 (7.52.1-5+deb9u9 =&gt; 7.52.1-5+deb9u10)
&nbsp;    &nbsp;libcurl3-gnutls (7.52.1-5+deb9u9 =&gt; 7.52.1-5+deb9u10)
&nbsp;    &nbsp;libdbus-1-3 (1.10.28-0+deb9u1 =&gt; 1.10.32-0+deb9u1)
&nbsp;    &nbsp;libgnutls-openssl27 (3.5.8-5+deb9u4 =&gt; 3.5.8-5+deb9u5)
&nbsp;    &nbsp;libgnutls30 (3.5.8-5+deb9u4 =&gt; 3.5.8-5+deb9u5)
&nbsp;    &nbsp;libldap-2.4-2 (2.4.44+dfsg-5+deb9u3 =&gt; 2.4.44+dfsg-5+deb9u4)
&nbsp;    &nbsp;libldap-common (2.4.44+dfsg-5+deb9u3 =&gt; 2.4.44+dfsg-5+deb9u4)
&nbsp;    &nbsp;libperl5.24 (5.24.1-3+deb9u6 =&gt; 5.24.1-3+deb9u7)
    &nbsp;&nbsp;libidn11 (1.33-1 =&gt; 1.33-1+deb9u1)
    &nbsp;&nbsp;libperl5.24 (5.24.1-3+deb9u5 =&gt; 5.24.1-3+deb9u6)
    &nbsp;&nbsp;libsasl2-2 (2.1.27~101-g0780600+dfsg-3 =&gt; 2.1.27~101-g0780600+dfsg-3+deb9u1)
    &nbsp;&nbsp;libsasl2-modules-db (2.1.27~101-g0780600+dfsg-3 =&gt; 2.1.27~101-g0780600+dfsg-3+deb9u1)
    &nbsp;&nbsp;libssl1.0.2 (1.0.2t-1~deb9u1 =&gt; 1.0.2u-1~deb9u1)
    &nbsp;&nbsp;libtimedate-perl (2.3000-2 =&gt; 2.3000-2+deb9u1)
    &nbsp;&nbsp;sudo (1.8.19p1-2.1+deb9u1 =&gt; 1.8.19p1-2.1+deb9u2)
    &nbsp;&nbsp;igmpproxy (0.1 =&gt; 0.2.1)
     &nbsp;tzdata (2019c-0+deb9u1 =&gt; 2020a-0+deb9u1)
</pre><h2>Known issues</h2><ul><li>[DPI] - Sometimes DPI is reporting wrong rx/tx counters</li><li>[Offloading] - L2TP IPSec traffic is not being offloaded on <em>Mediatek-based</em> routers (<strong>ER-X</strong>, <strong>ER-X-SFP,</strong> <strong>EP-R6</strong>)</li><li>[Offloading] - VLAN traffic is not being offloaded on <strong>ER-12 </strong></li></ul><h2>Additional information</h2><p>EdgeRouter firmware can be installed via&nbsp;<strong>CLI</strong>,&nbsp;<strong>WebGUI</strong>&nbsp;or&nbsp;<strong>UNMS</strong>. Detailed installation instruction is available&nbsp;<a href="https://help.ubnt.com/hc/en-us/articles/205146110-EdgeRouter-How-to-Upgrade-the-EdgeOS-Firmware" rel="noopener noreferrer" target="_blank">here</a>.</p><p>Checksums:</p><pre class="ql-syntax" spellcheck="false">ER-e50.v2.0.9.5346345.tar   - md5:411314387abecb3185c2c75dca5376ee - sha256:6e9266c44b1d8facdd21c174831ff0f6c273d49f5503688fcbf89ec45df4d244
ER-e100.v2.0.9.5346345.tar  - md5:02468bce89d52000186b75cc5f0c91bc - sha256:6a3d7e78fa5dd24a02d133ccd9bfc8b22b142453dc42a5e6d38b20eee5bc1797
ER-e200.v2.0.9.5346345.tar  - md5:2ec8d376cbf9552f8d14cbf3086800e0 - sha256:62ddf09a68eca710130b6d14a611515f664100f8ac13344d2b35846049d495c2
ER-e300.v2.0.9.5346345.tar  - md5:f47a532c8151533796c21e20cb64803a - sha256:694b6ed0bc5835a7ca97eeb4e1efa1e9c790c135d50ac41afb863fe0b052baa8
ER-e1000.v2.0.9.5346345.tar - md5:1a2957029db5ee83ad1d777f58a8974c - sha256:36696f8401687334a4ae3129282be4fba546e985d5ec1aa237273115a39190c8
</pre>]]></description>
            <link>https://community.ui.com/releases/EdgeMAX-EdgeRouter-Firmware-v2-0-9-v2-0-9/d75f346d-d734-4026-97a8-7b2d5cc4e079</link>
            <guid isPermaLink="false">d75f346d-d734-4026-97a8-7b2d5cc4e079</guid>
            <category><![CDATA[edgemax]]></category>
            <category><![CDATA[routing]]></category>
            <dc:creator><![CDATA[UI-afomins]]></dc:creator>
            <pubDate>Thu, 19 Nov 2020 10:39:45 GMT</pubDate>
        </item>
        <item>
            <title><![CDATA[EdgeMAX EdgeRouter Firmware v1.10.11]]></title>
            <description><![CDATA[<h2>Overview</h2><p>The&nbsp;<strong>ER-X</strong>/<strong>ER-X-SFP</strong>/<strong>EP-R6</strong>&nbsp;has more limited storage, and in some cases, an upgrade may fail due to not enough space. If this happens, remove the old backup image first (using "<em>delete system image</em>" CLI command, see&nbsp;<a href="https://help.ubnt.com/hc/en-us/articles/205146110-EdgeMAX-Upgrading-EdgeOS-firmware" rel="noopener noreferrer" target="_blank">here</a>&nbsp;for more details) before doing an upgrade.</p><p>More details can be found in the release notes below. Please give it a try if you are interested in the new features/changes to help us test them so that we can get the release out sooner! Thanks very much!</p><h2>New features</h2><ul><li>n/a</li></ul><h2>Improvements</h2><ul><li>n/a</li></ul><h2>Bugfixes</h2><ul><li>[PPPoE/L2TP/PPP] - Fix buffer overflow vulnerability in <code>pppd</code> daemon (<strong>CVE-2020-8597</strong>)</li><li>[IPV6] - Allow packets with <code>TTL=0</code> when "<strong>hwnat offloading</strong>" is enabled. This fixes <code><strong>DHCPv6</strong></code> problems on <strong>ER-X</strong>/<strong>ER-X-SFP</strong>/<strong>EP-R6</strong> models. Discussed <a href="https://community.ubnt.com/t5/EdgeRouter/EdgeMAX-EdgeRouter-software-version-v2-0-3-has-been-released/m-p/2813556#M254455" rel="noopener noreferrer" target="_blank">here</a></li><li>[Offloading] - Fix bug when router randomly crashed after disabling offloading on <strong>ER-Lite</strong>, <strong>ER</strong>, <strong>ER-Pro</strong>, <strong>ER-Infinity</strong>, <strong>ER-4</strong>, <strong>ER-6P</strong>, <strong>ER-12</strong>. Discussed <a href="https://community.ui.com/questions/Reproducible-kernel-oops-on-EdgeRouter-Infinity-with-EdgeOS-1-10-9-and-2-0-6/2dea3526-c1c4-47ec-98f0-2a6432525770#answer/fd82bfdf-7372-4c70-94fa-cff5dafca33d" rel="noopener noreferrer" target="_blank">here</a></li><li>[WebGUI] - Regenerate WebGUI certificate if it does not meet new <strong>iOS 13</strong> and <strong>MacOS 10.15</strong> requirements. Announced <a href="https://support.apple.com/en-us/HT210176" rel="noopener noreferrer" target="_blank">here</a></li><li>[IPSec] - Backport security fixes to <code>strongswan v5.2.2</code> (<strong>CVE-2015-3991</strong>, <strong>CVE-2015-4171</strong>, <strong>CVE-2017-9022</strong>, <strong>CVE-2017-9023</strong>, <strong>CVE-2017-11185</strong>, <strong>CVE-2018-10811</strong>)</li><li>[TechSupport] - Collect SLAB usage in support file</li><li>[MDNS] - Fix bug when mdns service did not start with vti configured</li><li>[Tcpdump] - Upgrade <code>tcpdump v4.9.3</code> to fix RCE vulnerability (<strong>CVE-2018-14880</strong>)</li><li>[SFP] - Fix bug when some SFP modules were mistakenly reporting TX error</li><li>[SSH] - Limit permitted SSH MACs to those permitted by <code>OpenSSH v7.4</code>. Disabling some that are now considered weak and get flagged by vulnerability scanners as such.</li></ul><h2>Known issues</h2><ul><li>IPv6 OSPF route disappears from routing table. See fix in <strong>Note #4</strong> in <strong>Instructions</strong> below</li></ul><h2>Additional information</h2><p>EdgeRouter firmware can be installed via&nbsp;<strong>CLI</strong>,&nbsp;<strong>WebGUI</strong>&nbsp;or&nbsp;<strong>UNMS</strong>. Detailed installation instruction is available&nbsp;<a href="https://help.ubnt.com/hc/en-us/articles/205146110-EdgeRouter-How-to-Upgrade-the-EdgeOS-Firmware" rel="noopener noreferrer" target="_blank">here</a>.</p><p>Checksum</p><pre class="ql-syntax" spellcheck="false">ER-e50.v1.10.11.5274269.tar   - md5:988e30741f7625a5b85996c7674c8baa - sha256:c74d0ddc07f076a7cc00761020dcc9eec0054d848b1f8b59ab1dcd89d512a9a9
ER-e100.v1.10.11.5274249.tar  - md5:6a8a4672c4ee29872fb435975ea605fd - sha256:0b298e3a9d7f1e7198d8786206a0b8763bdcd48bed4cae15b12b3ec230209b88
ER-e200.v1.10.11.5274249.tar  - md5:23c4efed590ab1fffd0d7f2c89581c6b - sha256:2ca1b61728dc4f215bbcfea908f5f577ff11476355edb915a7d842bfc1b98191
ER-e300.v1.10.11.5274249.tar  - md5:9c5686930ab5e98d9f713877f0166a42 - sha256:6bb449d09773407a13f261ea601938ece0efaf7eacdb4d2aeddb055ba5424795
ER-e1000.v1.10.11.5274249.tar - md5:0c5f0ad1ea7527c801a2b28aac790975 - sha256:4666f7d14f20a9fc1712d555ff0527a3602fdc6e0ed397f40da8f778678641f2
</pre><p><br></p><p><strong>NOTE #1:</strong>This firmware is the last "<em><u>Debian Wheezy</u></em>" based firmware running on top of <code>v3.10.107</code> kernel. There will be no more updates in <code>v1.10.x</code> firmware branch.</p><p><strong>NOTE #2: </strong>From now on security fixes and software component updates will be available only in <code>v2.0.x</code> branch!</p><p><strong>NOTE #3</strong>: This is the same firmware as the one that was published on<strong> beta forum</strong> last week <a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-RC-Firmware-v1-10-11-v1-10-11/18405625-9ae8-44b6-9ca8-f23aca6a0c28" rel="noopener noreferrer" target="_blank">here</a></p><p><br></p><p>💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪</p><p><strong>NOTE #4</strong> (Apr 23 2020):</p><p><br></p><p>There is a known OSPFv3 regression (introduced in <strong>v1.10.10</strong>) that is causing <em><u>IPv6 OSPF routes to disappear from routing table</u></em>. Discussed <a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Firmware-v1-10-11/12c0e77c-b677-48e7-b0ca-89f02e2a9176#comment/37f324d6-e403-4353-84f1-2c8f16825c51" rel="noopener noreferrer" target="_blank">here</a> and <a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Firmware-v1-10-11/12c0e77c-b677-48e7-b0ca-89f02e2a9176#comment/9f0b5417-2552-4358-a60e-2c01cf558323" rel="noopener noreferrer" target="_blank">here</a>.</p><p>This bug will be fixed in upcoming <strong>v2.0.9</strong> firmware but for <strong>v1.10.11</strong> fix is available <em><u>as a standalone DEB package</u></em> that should be installed on top of <strong>v1.10.11</strong> firmware.</p><p><br></p><p><strong>OSPFv3 fix installation instructions:</strong></p><p><strong>1) </strong>Download fixed <code>ubnt-protocols</code> DEB package from here:</p><ul><li>For <strong>ER-X</strong>, <strong>ER-X-SFP</strong>, <strong>ER-10X</strong> and <strong>EP-R6</strong> models -&gt; <a href="https://dl.ui.com/firmwares/edgemax/v1.10.11/ospfv3-fix/ubnt-protocols_9dev_mipsel.deb" rel="noopener noreferrer" target="_blank">https://dl.ui.com/firmwares/edgemax/v1.10.11/ospfv3-fix/ubnt-protocols_9dev_mipsel.deb</a></li><li>For all <strong>other ER</strong> models -&gt; <a href="https://dl.ui.com/firmwares/edgemax/v1.10.11/ospfv3-fix/ubnt-protocols_9dev_mips.deb" rel="noopener noreferrer" target="_blank">https://dl.ui.com/firmwares/edgemax/v1.10.11/ospfv3-fix/ubnt-protocols_9dev_mips.deb</a></li></ul><p><br></p><p>You can use following oneliner to download correct <code>ubnt-protocols</code> DEB package from ER bash shell:</p><pre class="ql-syntax" spellcheck="false">(readelf -h /bin/ls | grep "big endian" &gt; /dev/null) &amp;&amp; arch=mips ||
&nbsp;arch=mipsel &amp;&amp; curl -O https://dl.ui.com/firmwares/edgemax/v1.10.11/ospfv3-fix/ubnt-protocols_9dev_$arch.deb
</pre><p><br></p><p><strong>2) </strong>Verify <code>sha256</code> checksum by running following shell command:</p><pre class="ql-syntax" spellcheck="false">sha256sum ubnt-protocols_9dev_mips*.deb
</pre><p><br></p><p>Here are correct checksums:</p><pre class="ql-syntax" spellcheck="false">86526c189795c7c170f732d1a3c99436622a9e73152673c2e6d34594c7a2fa93&nbsp; ubnt-protocols_9dev_mips.deb
88b53650dba056b3539076aad3ca57cd33e8e279b6d372dc9361f964dfbba576&nbsp; ubnt-protocols_9dev_mipsel.deb
</pre><p><br></p><p><strong>3) </strong>Install fixed <code>ubnt-protocols</code> DEB package:</p><pre class="ql-syntax" spellcheck="false">sudo dpkg -i ubnt-protocols_9dev_mips*.deb
</pre><p><br></p><p><strong>4) </strong>Reboot</p><p>💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪💪</p>]]></description>
            <link>https://community.ui.com/releases/EdgeMAX-EdgeRouter-Firmware-v1-10-11/12c0e77c-b677-48e7-b0ca-89f02e2a9176</link>
            <guid isPermaLink="false">12c0e77c-b677-48e7-b0ca-89f02e2a9176</guid>
            <category><![CDATA[edgemax]]></category>
            <category><![CDATA[routing]]></category>
            <dc:creator><![CDATA[UI-afomins]]></dc:creator>
            <pubDate>Mon, 09 Mar 2020 11:48:26 GMT</pubDate>
        </item>
        <item>
            <title><![CDATA[EdgeMAX EdgeRouter Security Firmware Update v2.0.8-hotfix.1]]></title>
            <description><![CDATA[<h2>Overview</h2><p>The&nbsp;<strong>ER-X</strong>/<strong>ER-X-SFP</strong>/<strong>EP-R6</strong>&nbsp;has more limited storage, and in some cases, an upgrade may fail due to not enough space. If this happens, remove the old backup image first (using "<em>delete system image</em>" CLI command, see&nbsp;<a href="https://help.ubnt.com/hc/en-us/articles/205146110-EdgeMAX-Upgrading-EdgeOS-firmware" rel="noopener noreferrer" target="_blank">here</a>&nbsp;for more details) before doing an upgrade.</p><p>More details can be found in the release notes below. Please give it a try if you are interested in the new features/changes to help us test them so that we can get the release out sooner! Thanks very much!</p><h2>New features</h2><ul><li>n/a</li></ul><h2>Improvements</h2><ul><li>n/a</li></ul><h2>Bugfixes</h2><ul><li>[PPPoE/L2TP/PPP] - Fix buffer overflow vulnerability in <code>pppd</code> daemon (<strong>CVE-2020-8597</strong>)</li></ul><h2>Known issues</h2><ul><li>[Performance] - Throughput degradation by 5-10% when comparing with&nbsp;<strong>v1.10.x</strong> firmware with older kernel</li><li>[VPN] - L2TP remote access VPN does not work with Android6/7 L2TP clients (but works with Android9 client). L2TP issue on Android6/7 is caused by bad IPSec implementation on Android side, workaround discussed <a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Stable-Firmware-v2-0-6/81c2cfc5-a385-40e6-ac21-2d86e3a7dacf#comment/2b092caf-e791-47ac-9d24-56c82986bc35" rel="noopener noreferrer" target="_blank">here </a></li><li>[DPI] - Sometimes DPI is reporting wrong rx/tx counters</li><li>[Offloading] - On Cavium-based routers (<strong>ER</strong>, <strong>ER-Pro</strong>, <strong>ER-Lite</strong>, <strong>ER-PoE</strong>, <strong>ER-4</strong>, <strong>ER-6P</strong>, <strong>ER-12</strong>, <strong>ER-Infinity</strong>) small percentage of packets are randomly reordered. This issue was fixed in <strong>v1.10.0</strong> firmware but it reappeared since <strong>v2.0.0</strong> because of new Ethernet driver.</li></ul><h2>Additional information</h2><p>EdgeRouter firmware can be installed via&nbsp;<strong>CLI</strong>,&nbsp;<strong>WebGUI</strong>&nbsp;or&nbsp;<strong>UNMS</strong>. Detailed installation instruction is available&nbsp;<a href="https://help.ubnt.com/hc/en-us/articles/205146110-EdgeRouter-How-to-Upgrade-the-EdgeOS-Firmware" rel="noopener noreferrer" target="_blank">here</a>.</p><p>Checksum:</p><pre class="ql-syntax" spellcheck="false">ER-e50.v2.0.8-hotfix.1.5278088.tar&nbsp;&nbsp; - md5:af9b83af58fb9bec61a97049b8d81aee - sha256:b877aa2404ec768c2000d15c2aea53205be5f64046f671ba37d67860cd582846
ER-e100.v2.0.8-hotfix.1.5278088.tar&nbsp; - md5:ad4a05e29ea1304607f1776636bbe982 - sha256:23672e75f05c3e0f09d861b909719c66c3a415b3cc31a411ca984828d011a03e
ER-e200.v2.0.8-hotfix.1.5278088.tar&nbsp; - md5:e3685f503cbf0b260d55e9c19dd1a891 - sha256:65efafc644c18f37f32af75a2435297f4a9d178ea1f759e3ac9f5698fd456f6c
ER-e300.v2.0.8-hotfix.1.5278088.tar&nbsp; - md5:d4b30e3821621f16f6e960d753eaf073 - sha256:cc6c28fa9cc221bfa7073523452aa95bba0fe0cd2bf935dd44749a0e28622534
ER-e1000.v2.0.8-hotfix.1.5278088.tar - md5:795f53de8c502619616ee0bc19de594c - sha256:c00eb0aa186366313a592d0fc8f91331e0a43f9f9a89b44743e631ce9ce6153e
</pre>]]></description>
            <link>https://community.ui.com/releases/EdgeMAX-EdgeRouter-Security-Firmware-Update-v2-0-8-hotfix-1/e07022da-f8c7-4cb5-b020-5633c4f5455c</link>
            <guid isPermaLink="false">e07022da-f8c7-4cb5-b020-5633c4f5455c</guid>
            <category><![CDATA[edgemax]]></category>
            <category><![CDATA[routing]]></category>
            <dc:creator><![CDATA[UI-afomins]]></dc:creator>
            <pubDate>Fri, 06 Mar 2020 13:31:47 GMT</pubDate>
        </item>
        <item>
            <title><![CDATA[EdgeMAX EdgeRouter Firmware v2.0.8]]></title>
            <description><![CDATA[<h2>Overview</h2><p>The&nbsp;<strong>ER-X</strong>/<strong>ER-X-SFP</strong>/<strong>EP-R6</strong>&nbsp;has more limited storage, and in some cases, an upgrade may fail due to not enough space. If this happens, remove the old backup image first (using "<em>delete system image</em>" CLI command, see&nbsp;<a href="https://help.ubnt.com/hc/en-us/articles/205146110-EdgeMAX-Upgrading-EdgeOS-firmware" rel="noopener noreferrer" target="_blank">here</a>&nbsp;for more details) before doing an upgrade.</p><p>More details can be found in the release notes below. Please give it a try if you are interested in the new features/changes to help us test them so that we can get the release out sooner! Thanks very much!</p><h2>New features</h2><ul><li>[Offloading] - Ported <code>hwnat</code> offloading for <strong>ER-X</strong>/<strong>ER-X-SFP</strong>/<strong>ER-10X/EP-R6</strong> from <strong>v1.10.9</strong> firmware. Old <code>hwnat</code> offloading is much more stable than new one (which we used in EdgeOS firmwares from <strong>v2.0.1</strong> to <strong>v2.0.7</strong>). This fixes multiple <strong>IPv6</strong> and <strong>VLAN</strong> <strong>offloading</strong> issues in <strong>v2.0.x</strong> firmware as well as random kernel crash and failure to work in <strong>LoadBalancing</strong>/<strong>ECMP</strong> environments. Discussed <a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Beta-Firmware-v2-0-7/78a1434e-5337-416f-b8bb-c7ff678003d1#comment/6367a5f7-8992-4eed-aac9-3aa67c51a973" rel="noopener noreferrer" target="_blank">here</a></li><li>[WebGUI] - Add UNMS Cloud quick-connection button in WebGUI</li></ul><h2>Improvements</h2><ul><li>Offloading performance improved on <strong>ER-X</strong>, <strong>ER-X-SFP</strong>, <strong>ER-10X</strong> and <strong>EP-R6</strong> after back-porting <strong>hwnat</strong> from <strong>v1.10.9</strong> firmware.</li></ul><pre class="ql-syntax" spellcheck="false">     Version      CPU Load   Throughput 
---------------- ---------- ------------
  v1.10.9            20%      979 Mbps
  v2.0.6             59%      821 Mbps
  v2.0.8             23%     1030 Mbps       &lt;--------- Improved after backporting hwnat from v1.10.x firmware

</pre><ul><li>Increased optimization level for proprietary UBNT apps. This decreased memory footprint, increased performance and eliminated <code>"memory allocation failure"</code> errors that randomly occurred on <strong>ER-X</strong>/<strong>ER-X-SFP</strong> devices .</li><li>Improved forwarding performance on <strong>ER-Infinity</strong> when offloading is disabled. In our <em><u>UNMS QoS shaping scenario</u></em> we see +50% throughput growth when handling 256 clients (total throughput increased from 3.6Gbps to 5.5Gbps)</li></ul><h2>Bugfixes</h2><ul><li>[Offloading] - Fix bug when router randomly crashed after disabling offloading on <strong>ER-Lite</strong>, <strong>ER</strong>, <strong>ER-Pro</strong>, <strong>ER-Infinity</strong>, <strong>ER-4</strong>, <strong>ER-6P</strong>, <strong>ER-12</strong>. Discussed <a href="https://community.ui.com/questions/Reproducible-kernel-oops-on-EdgeRouter-Infinity-with-EdgeOS-1-10-9-and-2-0-6/2dea3526-c1c4-47ec-98f0-2a6432525770#answer/fd82bfdf-7372-4c70-94fa-cff5dafca33d" rel="noopener noreferrer" target="_blank">here</a></li><li>[Offloading] - Fix random <code>scheduling while atomic</code> kernel crash when IPSec offloading was enabled on <strong>ER-6P</strong>/<strong>ER-4</strong>. Discussed <a href="https://community.ui.com/questions/BUG-spontaneous-reboot-after-kernel-error-scheduling-while-atomic-swapper-1-0-0x00000500-with-v2-0-/934a6bed-6c9e-48bf-882c-df608b8e75da" rel="noopener noreferrer" target="_blank">here</a></li><li>[Offloading] - Fix bug when some VoIP implementations (WiFi Calling for Verizon) fail if hwnat offloading was enabled on <strong>ER-X</strong>/<strong>ER-X-SFP</strong>/<strong>ER-10X.</strong> Discussed <a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Beta-Firmware-v2-0-8-beta-1/d00bfd46-59b7-4304-8fdc-d7331134c954#comment/b8d72e9c-d9fe-4f66-ae59-ce20b6504c77" rel="noopener noreferrer" target="_blank">here</a></li><li>[Bootloader] - Show notification in shell that router needs to be rebooted in order to apply new boot image. Discussed <a href="https://community.ui.com/questions/Potential-Bug-in-Edgemax-ER4-v2-0-4/ef7b1b96-4839-401a-b9e0-2df97af34602" rel="noopener noreferrer" target="_blank">here</a></li><li>[WebGUI] - Regenerate WebGUI certificate if it does not meet new <strong>iOS 13</strong> and <strong>MacOS 10.15</strong> requirements. Announced <a href="https://support.apple.com/en-us/HT210176" rel="noopener noreferrer" target="_blank">here</a></li><li>[System] - Make platform-unique default hostname</li><li>[Switch] - Fix bug when switch interface on <strong>ER12</strong>/<strong>ER-12P</strong> occasionally did not work</li><li>[Switch] - Fix bug when packets tagged with 802.1p (PCP) were not processed by VLAN-aware switch. Discussed <a href="https://community.ui.com/questions/ER-X-problems-routing-VLAN-packets-with-firmware-v2-0-6/c28d0d20-c1e6-4bc9-856f-e6138ee00c5b" rel="noopener noreferrer" target="_blank">here</a> and <a href="https://community.ui.com/questions/EdgeRouter-drops-Packets-with-IEEE-802-1p-Priority-greater-0/66474905-e20f-44ff-bf4c-3328a44c8b04" rel="noopener noreferrer" target="_blank">here</a></li><li>[PoE] - Fix bug when PoE mistakenly remains ON when configuring using wizard</li><li>[Interfaces] - Fix bug when speed/duplex settings did not work on switch interfaces on <strong>ER-12</strong>/<strong>ER-12P</strong></li><li>[Interfaces] - Fix bad ethX rx/tx counters on ER-X when hwnat is enabled</li><li>[Kernel] - Improve interface link monitoring on <strong>ER-4</strong>/<strong>ER-6</strong>/<strong>ER-12</strong>. This reduces CPU load of the kernel</li><li>[Tech-Support] - Collect <code>SLAB</code> usage in tech-support file</li><li>[Tech-Support] - Fix regression from <code>v2.0.6</code> when WebGUI generated <em><u>brief</u></em> tech-support file instead of <em><u>full</u></em></li><li>[Security] - Fix CVE-2018-14880 vulnerability in tcpdump. Discussed <a href="https://community.ui.com/questions/PSA-CVE-2018-14880-The-OSPFv3-parser-in-tcpdump-before-4-9-3-has-a-buffer-over-read-in-print-ospf6-/28478b12-f4f6-45ab-8b37-bc64879cc12a" rel="noopener noreferrer" target="_blank">here </a></li><li>[Security] - Fix multiple <code>Buffer overflow</code> vulnerabilities when writing to different <code>/proc/xxx</code> entries which could be could be used to abuse kernel stack.</li><li>[Upgrade] - Improve upgrade process to ensure that it does not fail in low-RAM environment when upgrading from WebGUI/UNMS. This fixes random <em><u>upgrade failure</u></em> errors that were observed on <strong>ER-X</strong></li><li>[QoS] - Fix bug that caused <em><u>UNMS QoS</u></em> configuration to survive factory-reset</li><li>[QoS] - Fix bug that caused <code>Commit failure</code> when configuring <em><u>advanced-queue</u></em> on <em><u>redirected</u></em> interface. Discussed <a href="https://community.ui.com/questions/Advanced-queue-root-unable-to-be-set-on-redirected-interface/347c2608-8530-44d6-b861-9f2f0122d8af" rel="noopener noreferrer" target="_blank">here</a>.</li><li>process died because of insufficient free memory.</li><li>[Firewall] - Fix bug that caused <code>Commit failure</code> when configuring IPv6 MSS clamping. Discussed <a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Beta-Firmware-v2-0-8-beta-1/d00bfd46-59b7-4304-8fdc-d7331134c954#comment/04ff42ce-c4a3-4e56-a8b1-8a79dab89486" rel="noopener noreferrer" target="_blank">here</a>.</li></ul><p><br></p><ul><li>Upgraded following Debian base packages:</li></ul><pre class="ql-syntax" spellcheck="false">e2fslibs    (1.43.4-2 =&gt; 1.43.4-2+deb9u1)
e2fsprogs   (1.43.4-2 =&gt; 1.43.4-2+deb9u1)
libcomerr2  (1.43.4-2 =&gt; 1.43.4-2+deb9u1)
libexpat1   (2.2.0-2+deb9u2 =&gt; 2.2.0-2+deb9u3)
libss2      (1.43.4-2 =&gt; 1.43.4-2+deb9u1)
libssl1.0.2 (1.0.2s-1~deb9u1 =&gt; 1.0.2t-1~deb9u1)
libssl1.1   (1.1.0k-1~deb9u1 =&gt; 1.1.0l-1~deb9u1)
openssl     (1.1.0k-1~deb9u1 =&gt; 1.1.0l-1~deb9u1)
sudo        (1.8.19p1-2.1 =&gt; 1.8.19p1-2.1+deb9u1)
tcpdump     (4.9.2-1~deb9u1 =&gt; 4.9.3-1~deb9u1)
</pre><h2>Known issues</h2><ul><li>[Performance] - Throughput degradation by 5-10% when comparing with&nbsp;<strong>v1.10.x</strong> firmware with older kernel</li><li>[VPN] - L2TP remote access VPN does not work with Android6/7 L2TP clients (but works with Android9 client). L2TP issue on Android6/7 is caused by bad IPSec implementation on Android side, workaround discussed <a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Stable-Firmware-v2-0-6/81c2cfc5-a385-40e6-ac21-2d86e3a7dacf#comment/2b092caf-e791-47ac-9d24-56c82986bc35" rel="noopener noreferrer" target="_blank">here </a></li><li>[DPI] - Sometimes DPI is reporting wrong rx/tx counters</li><li>[Offloading] - On Cavium-based routers (<strong>ER</strong>, <strong>ER-Pro</strong>, <strong>ER-Lite</strong>, <strong>ER-PoE</strong>, <strong>ER-4</strong>, <strong>ER-6P</strong>, <strong>ER-12</strong>, <strong>ER-Infinity</strong>) small percentage of packets are randomly reordered. This issue was fixed in <strong>v1.10.0</strong> firmware but it reappeared since <strong>v2.0.0</strong> because of new ethernet driver.</li></ul><h2>Additional information</h2><p>EdgeRouter firmware can be installed via&nbsp;<strong>CLI</strong>,&nbsp;<strong>WebGUI</strong>&nbsp;or&nbsp;<strong>UNMS</strong>. Detailed installation instruction is available&nbsp;<a href="https://help.ubnt.com/hc/en-us/articles/205146110-EdgeRouter-How-to-Upgrade-the-EdgeOS-Firmware" rel="noopener noreferrer" target="_blank">here</a>.</p><p>Checksum:</p><pre class="ql-syntax" spellcheck="false">ER-e50.v2.0.8.5247496.tar&nbsp;&nbsp; - md5:2b6b7a8ceb87371d81a6549d1cab61fe - sha256:23aa317cf46aee4f5635eb8af75781ea76cbc49d03bc202812344466d88d631b
ER-e100.v2.0.8.5247496.tar&nbsp; - md5:b79d1e8b2368cd785adf7b46e8d2d014 - sha256:5f79966da466a15f0c8c6e192491aab466d5b05b76c2782b64a7e6a0f2802f8a
ER-e200.v2.0.8.5247496.tar&nbsp; - md5:839225391afd3a9674cce5365d400575 - sha256:29b6d435a8621e67f3cbb2684b443800fed8664e7bc0049a89cd8bc988118459
ER-e300.v2.0.8.5247496.tar&nbsp; - md5:14e43b202851b8207060a4c03a42b900 - sha256:323152aca327d591f442b50f1020270358aa9da201c6596880528e1944c90fa7
ER-e1000.v2.0.8.5247496.tar - md5:7da10542742a34802f79d2fcf49b2dcc - sha256:821252993975437f4c5fa68a6bbfdbe988cff4d3cd8489b71ddef03313d6d019
</pre>]]></description>
            <link>https://community.ui.com/releases/EdgeMAX-EdgeRouter-Firmware-v2-0-8/4d9cfba7-4a5a-403e-a5c8-26679d58620f</link>
            <guid isPermaLink="false">4d9cfba7-4a5a-403e-a5c8-26679d58620f</guid>
            <category><![CDATA[routing]]></category>
            <category><![CDATA[edgemax]]></category>
            <dc:creator><![CDATA[UI-afomins]]></dc:creator>
            <pubDate>Mon, 02 Dec 2019 15:59:32 GMT</pubDate>
        </item>
        <item>
            <title><![CDATA[EdgeMAX EdgeRouter Stable Firmware v1.10.10]]></title>
            <description><![CDATA[<h2>Overview</h2><p>The&nbsp;<strong>ER-X</strong>/<strong>ER-X-SFP</strong>/<strong>EP-R6</strong>&nbsp;has more limited storage, and in some cases, an upgrade may fail due to not enough space. If this happens, remove the old backup image first (using "<em>delete system image</em>" CLI command, see&nbsp;<a href="https://help.ubnt.com/hc/en-us/articles/205146110-EdgeMAX-Upgrading-EdgeOS-firmware" rel="noopener noreferrer" target="_blank">here</a>&nbsp;for more details) before doing an upgrade.</p><p><br></p><p>More details can be found in the release notes below. Please give it a try if you are interested in the new features/changes to help us test them so that we can get the release out sooner! Thanks very much!</p><h2>New features</h2><ul><li>n/a</li></ul><h2>Improvements</h2><ul><li>n/a</li></ul><h2>Bugfixes</h2><ul><li>[UNMS] - Fix bug when connection with UNMS failed if LLDP was enabled on <strong>ER-PoE</strong></li><li>[WebGUI] - Fix bug when ER could be DDoSed by opening a lot of unauthenticated WebGUI sessions</li><li>[WebGUI] - Fix WebGUI bug when VLAN configuration tab was missing on EP-R6. Discussed <a href="https://community.ubnt.com/t5/EdgeRouter/EP-R6-missing-switch0-VLAN-tab-in-1-10/m-p/2281576#M201176" rel="noopener noreferrer" target="_blank">here</a></li><li>[WebGUI] - Fix bad title displayed in browser tab</li><li>[OSPF] - Fix memory leak in OSPF when <em>access-list</em> is configured to filter received routes</li><li>[IPsec] - Fix potential authorization bypass vulnerabilities in <em>strongSwan</em> (<strong>CVE-2018-16151</strong>, <strong>CVE-2018-16152</strong>, <strong>CVE-2018-17540</strong>)</li><li>[OpenSSL] - Fix <strong>CVE-2019-1559</strong> security vulnerability in OpenSSL and upgrade OpenSSL to <strong>1.0.1t-1+deb8u11</strong></li><li>[Bootloader] - Add latest bootloader that supports TFTP recovery</li><li>[Kernel] - Fix SACK vulnerabilities in TCP networking stack (<strong>CVE-2019-11477</strong>, <strong>CVE-2019-11478</strong>)</li><li>[Kernel] - Fix excessive resource consumption flaw in TCP networking stack (<strong>CVE-2019-11479</strong>)</li><li>[Wizard] - Fix wrong WAN interface in "Basic Setup Wizard" on ER-X and ER-4. Discussed <a href="https://community.ubnt.com/t5/EdgeRouter-Beta/Spelling-errors/m-p/2700314/highlight/true#M24831" rel="noopener noreferrer" target="_blank">here</a></li><li>[Wizard] - Add IPv6 firewall rules by default in "<em>Basic Setup Wizard</em>"</li></ul><h2>Known issues</h2><ul><li>n/a</li></ul><h2>Additional information</h2><p>EdgeRouter firmware can be installed via&nbsp;<strong>CLI</strong>,&nbsp;<strong>WebGUI</strong>&nbsp;or&nbsp;<strong>UNMS</strong>. Detailed installation instruction is available&nbsp;<a href="https://help.ubnt.com/hc/en-us/articles/205146110-EdgeRouter-How-to-Upgrade-the-EdgeOS-Firmware" rel="noopener noreferrer" target="_blank">here</a>.</p><p>Checksum</p><pre class="ql-syntax" spellcheck="false">ER-e50.v1.10.10.5210345.tar   - md5:fc8404aeec575be0afb971bf0c679d7d - sha256:0b0ef2f858c9a0f6a0e9b0ccda890e9c10422afaa6a6704271a9ef84d795f646
ER-e100.v1.10.10.5210345.tar  - md5:85cf17825d042ef143a856b89498d502 - sha256:cd496077f8726b0445c3af1e0a4dadf86f3810c16f315b5b57805bde8265fed8
ER-e200.v1.10.10.5210345.tar  - md5:b7f2bd31e76c007a9722e5cffbd456a3 - sha256:7a5edeedb350db1ba71359b529adb8f9855d35247c975eecc43d771fe7c6f6be
ER-e300.v1.10.10.5210357.tar  - md5:c8b165f67a61d98638cb9d8f5edf7731 - sha256:5823080842402dd64cf5decb8ff901f46a8b8f5b7f476d593a27e747cc4d14d3
ER-e1000.v1.10.10.5210358.tar - md5:17870b4771c0bff16383ffdedcddd4e6 - sha256:f5c74f1a6e138fb87639b03f988e0ecb39b4db5c6817bf7b1ffae7aa3a9365e4
</pre>]]></description>
            <link>https://community.ui.com/releases/EdgeMAX-EdgeRouter-Stable-Firmware-v1-10-10/4f380d25-6e4b-405c-a2a1-2d2a20f96971</link>
            <guid isPermaLink="false">4f380d25-6e4b-405c-a2a1-2d2a20f96971</guid>
            <category><![CDATA[edgemax]]></category>
            <category><![CDATA[routing]]></category>
            <dc:creator><![CDATA[UI-afomins]]></dc:creator>
            <pubDate>Wed, 24 Jul 2019 12:31:38 GMT</pubDate>
        </item>
        <item>
            <title><![CDATA[EdgeMAX EdgeRouter Stable Firmware v2.0.6]]></title>
            <description><![CDATA[<h2>Overview</h2><p>This is <strong>urgent </strong>EdgeOS firmware release that contains only <strong>security fixes</strong> in kernel and IPSec areas. This is <em>almost </em>the same firmware as the <strong>v2.0.5</strong> that was published on beta forum 2 weeks ago. The only difference is that in <strong>v2.0.6</strong> we additionally upgraded "<em>udapi-bridge</em>" package to latest version v0.7.3 to support <em>new UNMS features</em>.</p><p><br></p><p>The&nbsp;<strong>ER-X</strong>/<strong>ER-X-SFP</strong>/<strong>EP-R6</strong>&nbsp;has more limited storage, and in some cases, an upgrade may fail due to not enough space. If this happens, remove the old backup image first (using "<em>delete system image</em>" CLI command, see&nbsp;<a href="https://help.ubnt.com/hc/en-us/articles/205146110-EdgeMAX-Upgrading-EdgeOS-firmware" target="_blank">here</a>&nbsp;for more details) before doing an upgrade.</p><p><br></p><p>More details can be found in the release notes below. Please give it a try if you are interested in the new features/changes to help us test them so that we can get the release out sooner! Thanks very much!</p><p><br></p><p><strong>👍👍👍 IMPORTANT NOTICE</strong> if ER that is used as a gateway in <strong>UNMS👍👍👍</strong></p><p>Please upgrade <strong>UNMS </strong>to version <em>v0.14.1/v1.0.0.-beta.5</em> or higher (UNMS release notes is available <a href="https://community.ui.com/releases/UNMS-version-0-14-1-and-1-0-0-beta-5-has-been-released/4e57ea82-ac30-4bbf-9b0f-ac611286e538" target="_blank">here</a>) before upgrading EdgeRouter to <em>v2.0.6,</em> otherwise there is a chance that ER will become unreachable from WAN interface. If this will happen then perform following steps in order to restore connectivity:</p><ul><li>Connect to ER from LAN interface via SSH</li><li>Commit following command in configuration mode - "<em>delete traffic-control optimized-queue</em>"</li></ul><h2>New features</h2><ul><li>n/a</li></ul><h2>Improvements</h2><ul><li>Add support for UNMS v1.0</li></ul><h2>Bugfixes</h2><ul><li>[Kernel] - Fix SACK vulnerabilities in TCP networking stack (<strong>CVE-2019-11477</strong>, <strong>CVE-2019-11478</strong>)</li><li>[Kernel] - Fix excessive resource consumption flaw in TCP networking stack (<strong>CVE-2019-11479</strong>)</li><li>[IPsec] - Fix potential authorization bypass vulnerabilities in <em>strongSwan</em> (<strong>CVE-2018-16151</strong>, <strong>CVE-2018-16152</strong>, <strong>CVE-2018-17540</strong>)</li></ul><h2>Known issues</h2><ul><li>[Performance] - Throughput degradation by 5-10% when comparing with&nbsp;<strong>v1.10.9</strong>&nbsp;firmware with older kernel.</li><li>[Offloading] -&nbsp;<em>IPsec</em>&nbsp;and&nbsp;<em>VLAN</em>&nbsp;offloading on&nbsp;<strong>ER-X</strong>/<strong>ER-X-SFP</strong>&nbsp;and&nbsp;<strong>EP-R6</strong>&nbsp;does not work yet.</li><li>[VPN] - L2TP remote access VPN does not work with Android6/7 L2TP clients (but works with Android9 client). </li></ul><p><strong>     UPDATE</strong>: L2TP issue is caused by bad IPSec implementation on Android side, workaround discussed <a href="https://community.ui.com/releases/EdgeMAX-EdgeRouter-Stable-Firmware-v2-0-6/81c2cfc5-a385-40e6-ac21-2d86e3a7dacf#comment/2b092caf-e791-47ac-9d24-56c82986bc35" target="_blank">here </a></p><ul><li>[LoadBalancing] - On ER-X LoadBalancing sometimes fails to recover after switching to failover interface.</li><li>[WebGUI] - Sometimes statistics in WebGUI is "freezing" and page refresh is needed in order to wake it up.</li><li>[DPI] - Sometimes DPI is reporting wrong rx/tx counters.</li></ul><h2>Additional information</h2><p>EdgeRouter firmware can be installed via&nbsp;<strong>CLI</strong>,&nbsp;<strong>WebGUI</strong>&nbsp;or&nbsp;<strong>UNMS</strong>. Detailed installation instruction is available&nbsp;<a href="https://help.ubnt.com/hc/en-us/articles/205146110-EdgeRouter-How-to-Upgrade-the-EdgeOS-Firmware" target="_blank">here</a>.</p><p>Checksum</p><pre class="ql-syntax" spellcheck="false">ER-e50.v2.0.6.5208541.tar   - md5:73fc871f64da1e92bc025f3a74de6f9e - sha256:71e36defd8a00ba61031bffd51f3fbb35685394312ca2ba6f5bc0dd7807a0d22
ER-e100.v2.0.6.5208553.tar  - md5:233cbd0968c3be078f894e208d9c55f9 - sha256:bba75211f683a19540a69ab12289c656c0036c9c245781ee92a725d673c39599
ER-e200.v2.0.6.5208554.tar  - md5:84c4fb188eacb7c200d46c392bff1aae - sha256:bc2a50a2bb10c22c4cfc421c73b2095678edc246cc0b1ebb4641e0759b22498d
ER-e300.v2.0.6.5208554.tar  - md5:e58cf1d62b2a428e0df1a31b24ce9d69 - sha256:4231f221a2b5f22cf6b453e7a91c6e65564465f63971084f3a6aad4ffff36d82
ER-e1000.v2.0.6.5208554.tar - md5:346a9372783fb35c0e3f560bba1f783c - sha256:918874d6abc39336533fbc161ac948edd55740b84ff2903fae35b1c11d168818
</pre>]]></description>
            <link>https://community.ui.com/releases/EdgeMAX-EdgeRouter-Stable-Firmware-v2-0-6/81c2cfc5-a385-40e6-ac21-2d86e3a7dacf</link>
            <guid isPermaLink="false">81c2cfc5-a385-40e6-ac21-2d86e3a7dacf</guid>
            <category><![CDATA[edgemax]]></category>
            <category><![CDATA[routing]]></category>
            <dc:creator><![CDATA[UI-afomins]]></dc:creator>
            <pubDate>Mon, 15 Jul 2019 10:54:10 GMT</pubDate>
        </item>
        <item>
            <title><![CDATA[EdgeMAX EdgeRouter Stable Firmware v2.0.4]]></title>
            <description><![CDATA[<h2>Overview</h2><p>The <strong>ER-X</strong>/<strong>ER-X-SFP</strong>/<strong>EP-R6</strong>&nbsp;has more limited storage, and in some cases, an upgrade may fail due to not enough space. If this happens, remove the old backup image first (using "<em>delete system image</em>" CLI command, see&nbsp;<a href="https://help.ubnt.com/hc/en-us/articles/205146110-EdgeMAX-Upgrading-EdgeOS-firmware" target="_blank">here</a>&nbsp;for more details) before doing an upgrade.</p><p>More details can be found in the release notes below. Please give it a try if you are interested in the new features/changes to help us test them so that we can get the release out sooner! Thanks very much!</p><h2>New features</h2><ul><li>[UNMS] - Add support for UNMS <strong>v1.0</strong></li></ul><h2>Improvements</h2><ul><li>[Dnsmasq] - Improve speed of dnsmasq initial configuration during boot.</li><li>[FactoryReset] - Add eth9 LED blinking when doing factory reset on <strong>ER-10X</strong>.</li><li>[TechSupport] - Add more IPSec info to tech-support file.</li><li>[Bootloader] - Upgrade bootloader automatically for those ERs that have backup bootloader partition (<strong>ER-8</strong>, <strong>ERPro-8</strong>, <strong>ER-8-XG</strong>).</li></ul><h2>Bugfixes</h2><ul><li>[Offloading] - Fix bug that caused Qos/Netflow malfunction when offloading was enabled.</li><li>[LLDP] - Fix regression in&nbsp;<strong>v2.0.1</strong>&nbsp;when interfaces of switch ports did not transmit LLDP frames. Discussed&nbsp;<a href="https://community.ui.com/questions/8371ee5c-a0b8-4bb1-ad77-68039695897a" target="_blank">here</a>.</li><li>[IPv6] - Add config validation that forbids simultaneous use of dhcpv6 and dhcpv6-pd. Discussed&nbsp;<a href="https://community.ui.com/questions/bc950f77-fe01-4e86-911f-fdd8a0dbb3ae#comment/b7501f95-f9dc-43b7-afc1-4768f3e34918" target="_blank">here</a>.</li><li>[Discovery] - Fix bug when UBNT discovery did not work if UNMS was configured.</li><li>[UPnP] - Fix bug when UPnP rules were not properly flushed by "<em>clear upnp2 rules</em>" CLI command. Discussed&nbsp;<a href="https://community.ui.com/questions/ace20d16-4723-4351-9929-e7cbc81ee57d#comment/c4f95ce3-03f8-46c8-ba17-8bfd70bd7adc" target="_blank">here</a>.</li><li>[Offloading] - Fix bug when syslog&amp;console were filled with "<em>protocol 0800 is buggy</em>" error messages if gre offloading was enabled. Discussed&nbsp;<a href="https://community.ui.com/questions/82d86374-e879-476f-b423-b1b29892f862#comment/f51101f1-a0a6-44fc-8a02-b1d9df5ab7ab" target="_blank">here</a>&nbsp;and&nbsp;<a href="https://community.ui.com/questions/f0b87a16-3e8f-45a6-9fa0-00483da44aee#comment/b3e1a588-fb46-47ce-9eba-324db5644b44" target="_blank">here</a>.</li><li>[SFP] - Fix bug when SFP status sometimes disappeared when SFP module was inserted. Discussed&nbsp;<a href="https://community.ui.com/questions/2182166a-d322-435a-8719-fdb17c3c9682" target="_blank">here</a>&nbsp;and&nbsp;<a href="https://community.ui.com/questions/6b307faf-aa26-482d-acba-5476ebc4e0aa" target="_blank">here</a>.</li><li>[Switch] - Fix regression in&nbsp;<strong>v2.0.0</strong>&nbsp;when counters of <em>switch0 </em>were not incremented on <strong>ER-12</strong>/<strong>ER-12P</strong>.&nbsp;</li><li>[Switch] - Fix potential packet&nbsp;<em>leaking&nbsp;</em>issue after detaching interface from <em>switch0</em>.</li><li>[Interface] - Fix bug when interfaces counters added in switch0 didn't get updated on <strong>ER-10X</strong>.</li><li>[Security] - Fix bug when ER could be DOSed by opening unauthenticated WebGUI session that would lead to resource consumption.</li><li>[Boot] - Disable interactive prompt when installing new packages from "<em>/config/data/firstboot/install-packages</em>". Discussed&nbsp;<a href="https://community.ui.com/questions/0d8c1fde-a200-462c-bded-cc13f4c685e7#comment/44d8eba4-c300-4bb2-9789-ba24509df702" target="_blank">here</a>.</li></ul><h2>Known issues</h2><ul><li>[Performance] - Throughput degradation by 5-10% when comparing with&nbsp;<strong>v1.10.9</strong>&nbsp;firmware with older kernel.</li><li>[Offloading] - <em>IPsec</em> and <em>VLAN</em> offloading on <strong>ER-X</strong>/<strong>ER-X-SFP</strong> and <strong>EP-R6</strong> does not work yet.</li><li>[VPN] - L2TP remote access VPN does not work with Android6/7 L2TP clients (but works with Android9 client).</li><li>[LoadBalancing] - On ER-X LoadBalancing sometimes fails to recover after switching to failover interface.</li><li>[WebGUI] - Sometimes statistics in WebGUI is "freezing" and page refresh is needed in order to wake it up.</li><li>[DPI] - Sometimes DPI is reporting wrong rx/tx counters.</li></ul><h2>Additional information</h2><p>EdgeRouter firmware can be installed via <strong>CLI</strong>, <strong>WebGUI</strong> or <strong>UNMS</strong>. Detailed installation instruction is available <a href="https://help.ubnt.com/hc/en-us/articles/205146110-EdgeRouter-How-to-Upgrade-the-EdgeOS-Firmware" target="_blank">here</a>.</p><p><br></p><p><br></p><p>Checksum</p><pre class="ql-syntax" spellcheck="false">ER-e50.v2.0.4.5199165.tar   - md5:84116c2bda2181f1aea17845462aeba1 - sha256:a84c43f791ec06dc51dde9fb0fc354f730f2bffed49c03ba5b6fa57ee7aa7607
ER-e100.v2.0.4.5199165.tar  - md5:78da95941df2f489ceb345eb74a3b454 - sha256:a9d274cff247f26af3b3b037b718aaa0be42a6e88463be427c382064c00914c4
ER-e200.v2.0.4.5199165.tar  - md5:dc5c07c5039fdad4a7462bb47c90ce48 - sha256:8e1deec2d86faa5e5616548b635c4ee8505073d2429be5759f572694f268b230
ER-e300.v2.0.4.5199165.tar  - md5:5b13eb02ca58abec52d71089ff69ff50 - sha256:e088a9a9ed556c9b432c1afc1c1ff1cfe75a921f60f1468a9f64551d3cc9dd7a
ER-e1000.v2.0.4.5199165.tar - md5:2f18c5a9a9e39e0ff54c61c0653d80d4 - sha256:17a3b1a3d7ccdbd94128c51d45fa8ecb687839b572cb0048c882da9b68454afe
</pre>]]></description>
            <link>https://community.ui.com/releases/EdgeMAX-EdgeRouter-Stable-Firmware-v2-0-4/f2608690-faf5-4b3f-b0a3-75343e7bdd2f</link>
            <guid isPermaLink="false">f2608690-faf5-4b3f-b0a3-75343e7bdd2f</guid>
            <category><![CDATA[routing]]></category>
            <category><![CDATA[edgemax]]></category>
            <dc:creator><![CDATA[UI-afomins]]></dc:creator>
            <pubDate>Wed, 26 Jun 2019 06:30:41 GMT</pubDate>
        </item>
        <item>
            <title><![CDATA[Recalling EdgeMAX EdgeRouter v2.0.1 Firmware for [ ER-X / ER-X-SFP / EP-R6 ]]]></title>
            <link>https://community.ui.com/releases/Recalling-EdgeMAX-EdgeRouter-v2-0-1-Firmware-for-ER-X-ER-X-SFP-EP-R6/707c1350-63b9-486d-a10b-182606eb718e</link>
            <guid isPermaLink="false">707c1350-63b9-486d-a10b-182606eb718e</guid>
            <category><![CDATA[edgemax]]></category>
            <category><![CDATA[routing]]></category>
            <dc:creator><![CDATA[UI-afomins]]></dc:creator>
            <pubDate>Wed, 17 Apr 2019 10:44:34 GMT</pubDate>
        </item>
        <item>
            <title><![CDATA[EdgeMAX EdgeRouter Software Release v1.10.6]]></title>
            <link>https://community.ui.com/releases/EdgeMAX-EdgeRouter-Software-Release-v1-10-6/a79b44a6-f0fc-4a9a-813a-a371ee09d471</link>
            <guid isPermaLink="false">a79b44a6-f0fc-4a9a-813a-a371ee09d471</guid>
            <category><![CDATA[edgemax]]></category>
            <category><![CDATA[routing]]></category>
            <dc:creator><![CDATA[UI-afomins]]></dc:creator>
            <pubDate>Thu, 23 Aug 2018 07:49:21 GMT</pubDate>
        </item>
    </channel>
</rss>