NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
FURRYe38
Apr 01, 2022Guru - Experienced User
New - R8000 Firmware Version 1.0.4.84 Released
Security Fixes: 3/30/22
Fixes security vulnerabilities. (Don't know if this resolves the DNS issues seen on v.76 version.)
For more information about security vulnerabilities, visit https://www.n...
profzoom
Oct 18, 2022Initiate
My gear R8000, 3 Extenders and numerous older netgear products I have used in the past. This is my 3rd Nighthawk I have purchased and worked good in 2020 after numerous Firmware upgrades (security purposes) it has stopped performing as intended. DNS issues, and WI-FI dropping and needing to be rebooted constantly. Wired connections work just fine. This will be my last Netgear purchase unless they can release a firmware that fixes the issues. I have reverted back to 1.0.4.6x firmware now.
- JOeHowskiNov 15, 2022Aspirant
BUG: If you go into Web Services Management and check the box "Always Use HTTPS to Access Router", you will be locked out of your router via the LAN ports. You will be routed to the https://www.netgear.com/home/services/routerlogincom/ page. Then you can't log into the router's IP address, which is dumb.
The nighthawk app is useless; it gives no clues on how to log into the control panel and is simplistic for an actual management panel.
WORKAROUND: Log in via wifi to Web address: www.routerlogin.net or www.routerlogin.com and log in as usual. Then reverse the setting to restore functionality.
I find it incredible that I can't submit a bug report directly to NETGEAR; so dumb and unprofessional.
BUG REPORT for R8000 update Firmware Version V1.0.4.84_10.1.84 as of 15/11/2022
Regards
Joe.
- FURRYe38Nov 15, 2022Guru - Experienced User
What do you mean by "you will be locked out of your router via the LAN ports. You will be routed to the https://www.netgear.com/home/services/routerlogincom/ page" ? You don't get any internet services thru the lan ports?
JOeHowski wrote:
BUG: If you go into Web Services Management and check the box "Always Use HTTPS to Access Router", you will be locked out of your router via the LAN ports. You will be routed to the https://www.netgear.com/home/services/routerlogincom/ page. Then you can't log into the router's IP address, which is dumb.
The nighthawk app is useless; it gives no clues on how to log into the control panel and is simplistic for an actual management panel.
WORKAROUND: Log in via wifi to Web address: www.routerlogin.net or www.routerlogin.com and log in as usual. Then reverse the setting to restore functionality.
I find it incredible that I can't submit a bug report directly to NETGEAR; so dumb and unprofessional.
BUG REPORT for R8000 update Firmware Version V1.0.4.84_10.1.84 as of 15/11/2022
Regards
Joe.
- JOeHowskiNov 18, 2022Aspirant
What do you mean by "you will be locked out of your router via the LAN ports. You will be routed to the https://www.netgear.com/home/services/routerlogincom/ page" ? You don't get any internet services thru the lan ports?
Lan ports are also known as "wired devices". typically labelled LAN 1 , LAN 2 , LAN 3 , LAN 4
So let me spell it out, the connection is via a wired PC (LAN) to your router R8000 control panel, and you decide to activate an HTTPS reconnection to the router by selecting the HTTPS check box. The idea is that the connection is private between the pc and router.
As soon as you do that, the router disconnects your connection via the pc and asks you to log in again, which is expected behaviour. Except when you go to log in, in my case https://10.0.0.1 you are redirected to https://www.netgear.com/home/services/routerlogincom/ page, which is the NetGear website. That redirection is wrong!
Now if you follow any of the advice on the website at "https://kb.netgear.com/27199/I-can-t-access-my-router-what-do-I-do", most of it doesn't work and is a waste of time.
Now instead, you type in https://10.0.0.1 via wifi, and you go to the normal login page, which allows you to access the normal router functionality.
Now I've clearly identified the bug and described how it is recreated.