Network
Firewall DMZ page
Services
Java package
SFTP server support
OPC UA client
Hotspot registered users management page
System
Portuguese language
Spanish language
Turkish language
Email Relay package
WebUI
New Web menu design
Network
Updated modem handling, attachment, tracking and connection establishment processes
Added the possibility to select multiple ports in all firewall port fields
Added 'Match' traffic by type option to firewall traffic rules
Added DNS servers and routing table fields to the Wireguard page
Improved generating network topology
Moved Relayd, UDP Relay & Static Leases to the Interfaces menu section
Update Firewall Traffic Rules page with DSCP and MARK options
Added keepalive, holdtime and connect timers to BGP configuration
Added 'Use gateway metric' to network protocols web interface
Added more DHCPv6 client events to system log
Moved IP Filter rules from Modbus TCP Gateway and Over IP services to Firewall page
Added option to select subnet parameters in mobile Passthrough/Bridge modes
Added WhereverSIM operator APN and fr.lebara.mobi APN to APN database
Added mobile connection state for IPv6
Added individual WiFi toggle support
Added error message when DFS channel is selected during scanning
Services
Added CSP headers to Hotspot Landing Page
Added hotspot user script validation
Improved logging of disconnecting client devices
Implemented Hotspot 'forget' method, which removes user from DB by MAC
Added execute custom script SMS Utilities rule
Added receiver and transceiver mode support to SMPP
Added timezone synchronization with GSM operator option to NTP Client
Updated Zerotier web interface
Added IPsec Flush connection option on tunnel initialization
Added MODBUS slave regfile validation
Added delay, number of timeouts, always reconnect options to MODBUS Master service
Added DMVPN Phase 2 and Phase 3 support
Added synchronization counting to NTP client
Expanded the data that is sent to the Cumulocity cloud with device log, mobile data usage nd GPS data
Added 'Unregister' button to RMS page
Added new data monitoring options to SNMP: configuration state of wireless, smart queues & VLANs
Updated Zerotier package to version 1.10.1
Added automatic package removal upon failed installation in Package Manager
Added option to describe custom routing table and MTU auto counting to Wireguard VPN
Added IP blocking to MQTT Bridge for failed login attempts to prevent bruteforce attacks
Updated sqm-scripts to version 1.5.1
Improved MODBUS Master service: added multiple datatypes, added multiple register reading for alarms
Added monthly reboot option to periodic reboot function
Added support for multiple custom option selection to SSTP configuration
Added PKCS12 certificate chain support to OpenVPN
Improved MQTT to support multiple port listening, multiple bridge connections, notification settings and added support for custom configuration file
Added QoS selection to MQTT Modbus Gateway
Improved RAM usage during upload and installation of packages via Package Manager
Updated curl to version 7.86.0
Added brute-force prevention measures to Post/Get
Added automatic private and public key generation to Wireguard VPN
Added multiple Remote source IP support to IPsec
Added the possibility to configure multiple IPsec phase 1 and phase 2 proposals
Added functionality to rotate log file when log is saved to Flash memory
Improved performance while fetching packages on repeat visits to the Package Manager page
System
Added a 'test mail' button to the Administration -> Recipients page
Added option to clear blocked IPs in the Access Control page after reboot
Updated Web Request-Response core logic
Added certificate validation to all services that support certificate upload
Updated URL protocol validations
Removed profile update requests during Save & apply
Optimized profile switching logic
WebUI
Added an indication to the Interfaces page that displays when data limit is enabled
Added bootloader version to the Device section in the System page
Added configuration page shortcuts to Overview page widgets
Added tooltip in Overview that show free, used and total RAM/Flash values on mouse cursor hover
Updated network interfaces protocols web interface
Updated 404 page to include navigation menu
Network
Fixed CVE-2023-32350 vulnerability
Fixed jumbo frames MTU issue
Added the 'Any' choice to source & destination IP address field in NAT rule edit
Fixed NHRP web interface issues
Fixed WAN interface configuration interfering with LAN
Fixed mdcollect memory leak issue
Fixed data limit not resetting properly
Fixed incorrect mobile data usage calculations for multiple day periods
Fixed an Auto APN 'Keep settings' issue
Fixed data counting after mobile data limit has been reached
Fixed mobile band not setting correctly on first try
Fixed incorrect data limit conditions causing unwanted SIM switches
Fixed Passthrough DHCP lease time setting
Fixed mobile bridge mode issue when no DNS servers are supplied
Added new Operator Lists instance name validations
Fixed mac80211 vulnerabilities CVE-2022-41674, CVE-2022-42719, CVE-2022-42720, CVE-2022-42721, CVE-2022-42722
Fixed wireless interfaces connections not reestablishing after disabling & enabling again
Added wget tracking method to WAN Failover
Added interface checks to remove inaccurate Failover events from the Event Log
Fixed Wired WAN connectivity issue when Failover interfaces are disabled
Fixed Failover fallback issue
Services
Fixed GRE, MQTT broker, IP alias, MAC filter & Failover migration from legacy firmwares
Fixed relay state switching
Fixed Save & Apply issue with ADC/ACL type condition on I/O Juggler
Added I/O restart on configuration profile change
Fixed I/O voltage range display for power socket pins
Fixed SMNP OID for I/O state
Fixed I/O Juggler SMS text message Save & Apply issue
Fixed Hotspot connected user list maximum upload/download value limits
Fixed incorrect connected Hotspot user information in RMS JSON
Removed unnecessary field from the Port Mirroring page
Fixed Hotspot issues related to specific connected phones
Fixed Wireless AP enabled by MODBUS TCP Master not showing in Wireless clients
Fixed WiFi Scanner hostname validation issues
Fixed UCI SMS Rule return message to display new changes
Fixed DNP3 issues when asking for modem temperature
Fixed base64 encoding of SMS messages when forwarding to HTTP
Fixed SMS sending issues when using multiple APN
Added Gateway modem option to IP Block and WoL in SMS Rule edit
Fixed unblocking IP addresses with an SMS message
Fixed Mobile Utilities page not load properly on some occasions
Fixed dbus vulnerability CVE-2020-35512
Fixed dnsmasq vulnerability CVE-2022-0934
Fixed ext4 vulnerability CVE-2021-3428
Fixed kernel vulnerabilities CVE-2021-3669, CVE-2021-4203, CVE-2022-1353, CVE-2022-3435, CVE-2022-20008, CVE-2022-30594
Fixed libxm12 vulnerability CVE-2022-29824
Fixed Linux vulnerabilities CVE-2021-4148, CVE-2022-0480, CVE-2022-1055, CVE-2022-0886, CVE-2022-2663, CVE-2022-36879 for v5.4
Fixed MQTT DoS vulnerability CVE-2021-41039
Fixed privoxy vulnerability CVE-2021-44542
Fixed python3 vulnerability CVE-2022-42919
Fixed strongswan vulnerabilities CVE-2021-41991, CVE-2021-45079
Fixed uboot vulnerabilities CVE-2022-30552, CVE-2022-30790
Fixed switching between RMS connection types while the device is unregistered
Fixed reload issues in website blocking feature
Fixed IPsec PSK secret required field validation
Fixed bandwidth limiting after QoS is enabled for the first time
Fixed Dropbear issues when logging in over IPv6
Fixed Modbus status in Status -> Services page
Fixed Azure IoT Hub application issues when sending large volumes of data
Fixed Azure IoT Hub MQTT password validation
Fixed DMVPN configuration migration issue
Fixed DMVPN duplicate select options, added suffix to mobile interfaces to use IPv4
Fixed DMVPN IPsec connection issue
Fixed DMVPN mobile interface 'Keep settings' migration issue
Fixed Dynamic DNS long hostname text display issue
Fixed Events Reporting memory leak issue
Fixed Events Reporting not triggering after flipping an I/O slider
Fixed FOTA cron job not starting after factory reset
Fixed IPsec local firewall option parsing
Fixed IPsec tunnel creation issue when compatibility mode is used and the tunnel name contains an underscore
Fixed L2TP, PPTP, SSTP state display in the Status -> Services page
Fixed NTP pool hostname validation
Fixed OpenVPN certificate remove with Static key and TLS authentication methods
Fixed OpenVPN configuration saving issue when using HMAC key authentication
Fixed OpenVPN custom dev name transformation to correct format
Fixed OpenVPN device name setting logic when uploading config from file
Fixed OpenVPN instance status display
Fixed OpenVPN TAP (bridged) configuration detection
Fixed Qos configuration saving issue occurring after instance deletion
Fixed RMS JSON incorrect WAN state and IP information
Fixed RMS step access issue in the Setup Wizard page
Fixed SNMP issues after reboot while using a Hotspot
Fixed SNMP generating MIB files for devices in accordance with to their hardware
Fixed SNMP traps not working after SNMP is installed from server
Fixed SSTP client route creation issue
Fixed UPNP secure mode not turning off issue
Fixed Wireguard route to endpoint issue
Fixed manual package installation for queued packages
Fixed NAT Rules dependency from IPsec web instance
Returned usleep utility
Updated Australian and South African NordVPN server IP addresses
System
Fixed certificate signing issues
Fixed Telnet, CLI access blocking after max invalid tries
Fixed FW upgrade with 'Keep settings' while low free space is available
Fixed backup file duplication issue
Fixed network device handling in system
WebUI
Fixed Hotspot interface display
Fixed side widget accessibility during first login
Fixed file upload issues
Fixed drag and drop issue in the Traffic Rules page
Fixed protocol display in the overview of the Interfaces page
Fixed blocked IP settings migration during a FW upgrade with the 'Keep settings'
Fixed login errors after browser tab restoration
Fixed redirect to newly set IP address after Interface configuration
Fixed firmware upgrade verify spinner not closing
Fixed an issue with file upload via drag and drop
Before you consider downloading this firmware, go to the system information page of the router and make sure that the currently installed version isn't either newer or matching this release.
Due to the large variety of router models and different methods for upgrading the device, it is highly recommended that you read and, above all, understand the installation steps before you apply the new firmware, even if you are a power user.
In theory, these steps shouldn't be much of a hassle for anyone, because manufacturers try to make them as easy as possible, even if they don't always succeed. Basically, you must upload the new firmware to the router through its administration page and allow it to upgrade.
If you install a new version, you can expect increased security levels, different vulnerability issues to be resolved, improved overall performance and transfer speeds, enhanced compatibility with other devices, added support for newly developed technologies, as well as several other changes.
If you're looking for certain safety measures, remember that it would be best if you perform the upload using an Ethernet cable rather than a wireless connection, which can be interrupted easily. Also, make sure you don't power off the router or use its buttons during the installation, if you wish avoid any malfunctions.
If this firmware meets your current needs, get the desired version and apply it to your router unit; if not, check with our website as often as possible so that you don't miss the update that will improve your device.
Top 4 Download periodically updates information of Teltonika RUT240 Router Firmware RUT2_R_00.07.03 full driver from the manufacturer, but some information may be slightly out-of-date.
Using warez version of Teltonika RUT240 Router Firmware RUT2_R_00.07.03 driver is hazardous. Our driver download links are directly from our mirrors or publisher's website, Teltonika RUT240 Router Firmware RUT2_R_00.07.03 torrent files or shared files from free file sharing and free upload services, including Rapidshare, HellShare, HotFile, FileServe, MegaUpload, YouSendIt, MailBigFile, DropSend, MediaMax, zUpload, MyOtherDrive, SendSpace, DepositFiles, Letitbit, LeapFile, DivShare or MediaFire, are not allowed!
It is not recommended to download drivers from illegal sites which distribute a keygens, key generators, pirate keys, serial numbers, warez full versions or cracks for Teltonika RUT240 Router Firmware RUT2_R_00.07.03. These drivers might corrupt your computer installation or breach your privacy. A driver might contain a trojan horse opening a backdoor on your computer. Hackers can use this backdoor to take control of your computer, copy data from your computer or to use your computer to distribute viruses and spam to other people.