Showing results for 
Search instead for 
Did you mean: 

New ASUS GT-AX11000 Firmware version dated 31/05/2023

Level 13

ASUS GT-AX11000 Firmware version

New features:
-Built-in Surfshark in VPN Fusion allows you to surf the internet anonymously and securely from anywhere by encrypting connections. Please refer to

-iPhone/Android USB auto backup WAN allows you to connect your phone to the router’s USB port and use it as an internet source. Please refer to

-DDNS transfer allows you to transfer your ASUS DDNS hostname from your original router to the new one. Please refer to

Bug fixes and functionality modifications:
-Resolved the issue with login and password changes.
-Resolved the IPSec VPN connection issues.
-Resolved the Instant Guard connection issues.
-Fixed the AiCloud login issue after unplugging and plugging the HDD into the USB port.
-Fixed the issue where Traffic Analyzer sometimes couldn't record data.
-Fixed the time display issue for the preferred upgrade time in the Auto Firmware Upgrade function.
-Fine-tuned the description for port status.
-Enabled DynDNS and No-IP DDNS to use IPv6.
-Fixed AiMesh preferred AP identification in site survey results.
-Updated timezone list for Greenland, Mexico, and Iran.
-Modified the USB application option text in dual WAN.
-Allowed WireGuard Server clients to access the Samba server.
-Fixed memory leak issue.
-Enabled the failback function when using the iOS/Android USB backup WAN.
-The ARP response issue has been resolved, along with the connection issue between the router and the ROG Phone 6 and 7.
-Resolved the issue where the USB path is not displayed on the Media Server page in the AiMesh node

Security updates:
-Enabled and supported ECDSA certificates for Let's Encrypt.
-Enhanced protection for credentials.
-Enhanced protection for OTA firmware updates.
-Fixed DoS vulnerabilities in firewall configuration pages. Thanks to Jinghe Gao's contribution.
-Fixed DoS vulerabilities in httpd. Thanks to Howard McGreehan.
-Fixed information disclosure vulnerability. Thanks to Junxu (Hillstone Network Security Research Institute) contribution.
-Fixed CVE-2023-28702 and CVE-2023-28703. Thanks to Xingyu Xu(@tmotfl) contribution.
-Fixed null pointer dereference vulnerabilities. Thanks to Chengfeng Ye, Prism Research Group - cse hkust contribution.
-Fixed the cfg server vulnerability. Thanks to Swing and Wang Duo from Chaitin Security Research Lab.
-Fixed the vulnerability in the logmessage function. Thanks to Swing and Wang Duo from Chaitin Security Research Lab C0ss4ck from Bytedance Wuheng Lab, Feixincheng from X1cT34m.

Please unzip the firmware file, and then verify the checksum.
SHA256: 30a2d458aa07bbc52dd657861255e59b4ab7157257a36f82d99c0b454fc981d1


Level 13

It will be a good practice to manually setup again to prevent error in the backup bring it back into new firmware. Being doing this for all my previous router.

I do it slightly differently.  If there’s some problem then I hard reset.  Sometimes it works fine without needing to….

Level 8

I just did a hard reset but I did a restore from backup first. I didn't want to do manual set up again (because I have lots of settings and it's a PITA).  We'll see how that goes. Hopefully I don't have to do it manual set up.  I will give an update in a few days. Thank you everyone for the advice.

Level 8

I'm happy to report that doing a hard reset and reloading my backup settings file worked. It's been since Thursday night and no issues since. 

  • Upgrade FW
  • Factory Reset from Web UI
  • Wasn't sure if I should've pressed the reset button instead so I pressed the reset button again to be sure 🤣
  • Manual restart once I see all factory wifi bands are up just in case
  • Do the default setup and load my settings.
  • Manual restart.

Thank you again everyone for the tip! A little PITA but as long as loading the backup file works it's not too bad. 


Level 10

turns out 22525 on a clean install falls over also,initially I just flashed over my beta

Level 7

Since upgrading to this firmware I've noticed that the download master application does not adhere to the default VPN connection in VPN fusion like it did previously. I also don't see an option to select the router as an endpoint to have it use a VPN tunnel all the time which has never been an option but should  be. Any others notice this?