The AsusWrt-Merlin firmware was developed with the primary goal of boosting the original ASUS firmware, fix bugs and also add new improvements. This package includes a customized firmware targeted at ASUS routers that brings various changes without modifying the interface of the original firmware.
- COMPATIBLE WITH:OS Independent
- File size :30.7 MB
AsusWrt-Merlin Firmware 380.62 for RT-AC56R for OS Independent
– NEW: Added nano 2.7.0 (user-friendly text editor). Note that for space reasons, some of its features are disabled for the RT-N66U and RT-AC66U. Entware users might want to uninstall the Entware version if they had it installed and want to use the built-in version instead.
– NEW: Option to toggle the display of passwords on the PPTPD and OpenVPN server pages.
– NEW: Allow providing a vendor class on the WAN page (DHCP option 60)
– NEW: Add option to disable sending a RELEASE request when odhcp6c exits, allowing you to retain your received prefix with some ISPs.
– CHANGED: Updated nettle to 3.2 (used for dnssec) and increased optimization level.
– CHANGED: Updated minidlna to 1.1.6
– CHANGED: Updated OpenVPN to 2.3.12
– CHANGED: Updated OpenSSL to 1.0.2i
– CHANGED: Revamped the Wireless Log page: Merged some columns to gain more horizontal space, Longer hostname shown (truncated names are now shown in a tooltip), Display clients’ IPv6 if they have one
– CHANGED: Accept up to 250 characters for OpenVPN client’s username and password (one provider needs 64).
– CHANGED: Hide the WPA key on the Wireless config page, and only reveal it when you click on the field to edit it.
– FIXED: OpenVPN client shouldn’t display policy routing settings when using a TAP interface.
– FIXED: DSL/ATM overhead setting was visible on MIPS models, which don’t support it.
– FIXED: Editing OpenVPN or PPTP users with any value larger than 32 chars could lead to corruption of the user list.
– FIXED: Custom config file for igmpproxy wasn’t working.
– FIXED: After turning off a Guest network, the next visit to the Wireless Settings page would show that guest network’s settings instead of the parent band settings (Asus bug)
– FIXED: Smart Connect rules didn’t apply on the RT-AC88U (backported fix from 380_3941).
– FIXED: Numerous memory leaks in the networkmap service. (Asus bug)
– FIXED: Potential buffer overrun in the networkmap service. (Asus bug)
– FIXED: Broken IPv6 connectivity if enabling SSH brute force protection (only MIPS models were affected)
– FIXED: DHCP lease renewals would fail with ISPs with a broken DHCP server that sent replies from a different IP address.
– FIXED: 5G LED would fail to turn back on when exiting stealth mode.
– FIXED: Only hostname was used as remote server in an exported OpenVPN client config when using Namecheap DDNS.
– FIXED: Security vulnerability (XSS/CSR) in httpd (backported fix from 380_4005).
– FIXED: Chrome would try to auto fill some fields (such as on the DDNS configuration page), which could be problematic.
– FIXED: IPTraffic database was no longer properly named after the router’s MAC address on the AC88/AC3100/AC5300. If you recently enabled it, you will need to either re-create a new database, or rename the existing database from tomato_cstats_000000000000.gz to tomato_cstats_XXXXXXXXXXXX.gz, where “XXXXXXXXXXXX” is your MAC as found with “nvram get et2macaddr”, in lowercase (AC88/AC3100/AC5300 only). Regular traffic monitoring (stored in tomato_rstats_XXXXXXXXXXXX.gz) is fine.
– This custom firmware can be applied like any regular update.
– You should not need to reset to factory defaults.
– You can revert back to an original ASUS firmware at any time.
– Do not load a saved copy of your settings.
About Router Firmware:
Before you consider downloading this firmware, go to the system information page of the router and make sure that the currently installed version isn’t either newer or matching this release.
Due to the large variety of router models and different methods for upgrading the device, it is highly recommended that you read and, above all, understand the installation steps before you apply the new firmware, even if you are a power user.
In theory, these steps shouldn’t be much of a hassle for anyone, because manufacturers try to make them as easy as possible, even if they don’t always succeed. Basically, you must upload the new firmware to the router through its administration page and allow it to upgrade.
If you install a new version, you can expect increased security levels, different vulnerability issues to be resolved, improved overall performance and transfer speeds, enhanced compatibility with other devices, added support for newly developed technologies, as well as several other changes.
If you’re looking for certain safety measures, remember that it would be best if you perform the upload using an Ethernet cable rather than a wireless connection, which can be interrupted easily. Also, make sure you don’t power off the router or use its buttons during the installation, if you wish avoid any malfunctions.
If this firmware meets your current needs, get the desired version and apply it to your router unit; if not, check with our website as often as possible so that you don’t miss the update that will improve your device.