PCI-DB.com
  1. Driver
  2. Router Switch Access Point
  3. Ubiquiti EdgeRouter ERPro-8 Router Firmware 1.9.1

Ubiquiti EdgeRouter ERPro-8 Router Firmware 1.9.1 Download

Posted at December 18, 2024 by PCI-DB Team

Install Driver Automatically
Device NameUbiquiti EdgeRouter ERPro-8 Router Firmware 1.9.1
CategoryRouter Switch Access Point
ManufacturerUbiquiti
File Size82.8 MB
Supported OSOS Independent

Ubiquiti EdgeRouter ERPro-8 Router Firmware 1.9.1 Description

New features

- [FW Update] Add automated firmware update check. This is just a first step in providing automated firmware updates and current functionality only checks for update but does not download actual firmware. Complete automatic firmware update functionality will be provided in future release.

Enhancements and bug fixes

- [Web UI] Fix bug when app categories were not showing up in basic queue in safari.
- [Web UI] Fix EdgeOS compromise due to XSS in encoder error handling
- [Web UI] Fix IP address validation bug in "Load Balancing2" wizard
- [Web UI] Fix broken dashboard in Firefox.
- [Web UI] Fix bug when "Basic Setup" wizard with dhcp & vlan generates wrong NAT config.
- [BGP] Fix bug when "ribd" was constantly consuming 10% CPU with full BGP routing table.
- [Routing] Fix random "nsm" daemon crash when multiple interfaces flap simultaneously.
- [Routing] Fix incomplete default gateway when pppoe link fails.
- [Routing] Fix bug when "ribd" was sometimes stuck consuming 100% CPU after link to default gateway failed.
- [Routing] Fix bug when "set ip-next-hop x.y.z.w" route-map CLI command had no effect
- [Routing] Fix bug when "show ip route" CLI command was showing "Network not in table" error instead of default gateway
- [Routing] Fix bug when custom routing tables sometimes were not populated after boot.
- [Routing] Improve memory management in routing daemons (i.e. bgpd, nsm, ribd...).
- [RIP] Fix wrong RIP distance.
- [VPLS] Show VPLS instance expiration time via "show vpls xxx mac-address" CLI command
- [VPLS] Fix kernel crash when VPLS interface loses link.
- [Interfaces] Add VLAN to pseudo-ethernet interface configuration
- [Interfaces] Allow switch0 to be added to br0 on ER-X
- [Interfaces] Add "proxy_arp_pvlan" option to VLAN interfaces
- [Interfaces] Add ipip6 encapsulation to ipv6-tunnel interface
- [Interfaces] Setup default multicast routes over GRE ipv6 PtP links
- [Interfaces] The auto-negotiation of SFP port on ER-X-SFP and EP-R6 is changed to enabled by default.
- [CLI] Add warning message when saving config to non-default location
- [CLI] Change commit-confirm message
- [DHCP] Fix remote command injection through DHCP request
- [DHCP] Fix high CPU load when diffing DHCP lease files.
- [DHCP] Fix garbage output when running "show dhcpv6-pd duid" CLI command on ER-X
- [DHCP] Fix error when DHCP static lease with dot in name (i.e. "lch.cern") was not written to /etc/hosts and thus could not be resolved by dnsmasq.
- [Firewall] Add vtun6 interface type to mss-clamp6 firewall option
- [Firewall] Fix bug when "show firewall statistics" CLI command ignored ipv6-tunnel interface
- [Kernel] Add fix for CVE-2016-5696.
- [Kernel] Enable "netconsole" on ER-X
- [NTP] Remove deprecated "dynamic" NTP option.
- [IPsec] Fix IPSec over IPv6 conditional expression bug.
- [L2TP] Fix bug when L2TP config was not cleared from ipsec config files after deletion
- [IPsec] Fix bug when VPN configuration disappears after reboot if 'dhcp-interface' has no address.
- [UPNP] Fix UPnP2 firewall rules
- [DNSmasq] Fix bug when dnsmasq config becomes corrupted if DHCP server exports static route.
- [LoadBalancing] Fix bug when L2TP interface lost connectivity in load-balancing scenario because connected routes got deleted from load balancing routing tables.

Updated software components

- [Kernel] - Fix CVE-2016-5195 aka “Dirty COW”.
- [PHP] - Upgraded PHP to 7.0.12. Fix: CVE-2016-7418, CVE-2016-7417, CVE-2016-7416, CVE-2016-7414, CVE-2016-7413, CVE-2016-7412, CVE-2016-7411, CVE-2016-7134, CVE-2016-7133, CVE-2016-7132, CVE-2016-7131, CVE-2016-7130, CVE-2016-7129, CVE-2016-7128, CVE-2016-7127, CVE-2016-7126, CVE-2016-7125, CVE-2016-7124

About Router Firmware:

Before you consider downloading this firmware, go to the system information page of the router and make sure that the currently installed version isn’t either newer or matching this release.

Due to the large variety of router models and different methods for upgrading the device, it is highly recommended that you read and, above all, understand the installation steps before you apply the new firmware, even if you are a power user.

In theory, these steps shouldn’t be much of a hassle for anyone, because manufacturers try to make them as easy as possible, even if they don’t always succeed. Basically, you must upload the new firmware to the router through its administration page and allow it to upgrade.

If you install a new version, you can expect increased security levels, different vulnerability issues to be resolved, improved overall performance and transfer speeds, enhanced compatibility with other devices, added support for newly developed technologies, as well as several other changes.

If you’re looking for certain safety measures, remember that it would be best if you perform the upload using an Ethernet cable rather than a wireless connection, which can be interrupted easily. Also, make sure you don’t power off the router or use its buttons during the installation, if you wish avoid any malfunctions.

If this firmware meets your current needs, get the desired version and apply it to your router unit; if not, check with our website as often as possible so that you don’t miss the update that will improve your device.

  It is highly recommended to always use the most recent driver version available.

Try to set a system restore point before installing a device driver. This will help if you installed an incorrect or mismatched driver. Problems can arise when your hardware device is too old or not supported any longer.

Related Ubiquiti Drivers

Find Missing Drivers

© 2024 PCI-DB.com - PCI Database Replacement. All rights reserved.