Author
Message
blkt DD-WRT Guru Joined: 20 Jan 2019 Posts: 6436
Posted: Mon Dec 29, 2025 17:26 Post subject: [BUILD PULLED] New Build - 12/29/2025 - r63200
Welcome to Marvell r63200 beta release thread for reporting, feedback to developers and community benefit.
Please do not flash builds until installation is understood, risks involved and device specific recovery methods .
Avoid discussions , create threads for questions, general problems or use search; this thread is not for support.
List router model & version or revision , operating & wireless modes & exact filename /firmware image flashed.
CLI Flash : 'cd /tmp ' then 'wget {file URL} ' (http only ) or 'curl -O {file URL} ' (http , https , ftp ) 'write {file} linux ' then 'reboot '.
Downloads : HTTPS , FTP
Trac SVN : repository since last build r63123 (mirror )
• Open VPN 2.6.17 : Changelog , Guides, Server, PBR, DNS, Kill Switch, Watchdog, Reverse PBR, Client, Multiple, tips, scripts .
• WireGuard 1.0.20211208 /Tools : Changelog , Guides, Client, Server, Adv, PBR, KS, tips, scripts . Thanks BS egc & eibgrad!
Notes : ...
r61542 r61557 r61613 r61648 r61711 r61745 r61848 r61915 r61920 r61954 r61970 r61981 r62032 r62036 r62104 r62157
r62170 r62192 r62240 r62268 r62324 r62365 r62374 r62418 r62460 r62508 r62540 r62606 r62778 r62890 r62966 r63020
r63093 r63123 r63200
Issues , observations , and/or workarounds reported:
• WebUI : Clear history or use a portable . Temporary cache bypass : Ctrl+F5, Cmd+Shift+R or new private window /incognito .
• Please report findings with steps needed to reproduce, configuration, clients, output , logs and important information below !
Important :
• Detail issues & relevant configs , logs: syslog klog 'dmesg ' 'cat /tmp /var /log /messages ' nvram set console_debug=1, serial.
• Firewall NAT: 'iptables -vnL ' 'iptables -t nat -vnL ' 'iptables -t mangle -vnL ' & 'cat /tmp /.ipt '. Debug Analyze: strace tcpdump .
• Gremlins: reboot . cold boot. Reset & reconfigure not restore backup . Search Trac & discuss in forum before opening tickets .
• Include operating & wireless modes (e.g. Gateway, Router, AP, SB, WDS, Mesh) and applicable configurations to reproduce .
Example Template : Code: [b]Router/Version: [/b]
[b]File/Kernel: [/b]
[b]Previous/Reset: [/b]
[b]Mode/Status: [/b]
[b]Issues/Errors: [/b]
Back to top
Sponsor
oliver44 DD-WRT Guru Joined: 01 Jun 2016 Posts: 538
Posted: Mon Dec 29, 2025 23:01 Post subject:
Router Model Linksys WRT1900ACS v2
Firmware Version DD-WRT v3.0-r63200 std (12/29/25)
Kernel Version Linux 6.1.159-rt28 #297 SMP Mon Dec 29 03:49:40 +07 2025 armv7l
Uptime 4:19
update-browser waterfox, I switched from -r53616, all ok
connection Type PPPoE - IPv6 Type DHCPv6 with Prefix Delegation 1Gbps
IPv6 Type DHCPv6 with Prefix Delegation-On - all Ok
Operating Mode Gateway/AP
Shortcut Forwarding Engine-On
Schedule Reboot-On,
Web Access Protocol - HTTPS,
SSH (public key)-all ok
Port Forwarding - all Ok,
USB - System Log -all Ok
Schedule Reboot - At a Set Time - On
Wireless Interface 5GHz-Wireless Mode AP-Wireless Network Mode-AC/N, Width VHT 80 Mhz-Wireless Channel-36,Extension Channel UU, Short GI, Short Preamble, Single User Beamforming, Radio Scheduling, TX Power-30dBm ,TX Antenna Chains-1+2+3+4, RX Antenna Chains-1+2+3+4, Enable-WPA2 - WPA3 Personal / SAE-CCMP-128 (AES) , Regulatory Domain Romania, all-ok
Wireless Interface 2.4GHz-Wireless Mode AP-Wireless Network Mode-N, Width VHT 40 Mhz-Wireless Channel-11, Extension Channel Lower, Short Preamble, Short GI, Radio Scheduling,TX Power-30dBm ,TX Antenna Chains-1+2+3+4, RX Antenna Chains1+2+3+4, Enable-WPA2 / SAE-CCMP-128 (AES) all-ok !
Quote: Code: [list]└─iptables -vnL
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
┌─[✓]─[root@DD-WRT:192.168.1.1]─[~]
└─iptables-nft -vnL
# Warning: iptables-legacy tables present, use iptables-legacy to see them
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
53 3180 ACCEPT all -- oet1 * 0.0.0.0/0 0.0.0.0/0 state NEW
1010 426K ACCEPT udp -- ppp0 * 0.0.0.0/0 0.0.0.0/0 udp dpt:51820
3617 1160K SECURITY all -- * * 0.0.0.0/0 0.0.0.0/0
2772 703K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
23 1420 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID
0 0 ACCEPT 41 -- ppp0 * 0.0.0.0/0 0.0.0.0/0
0 0 DROP icmp -- ppp0 * 0.0.0.0/0 0.0.0.0/0
0 0 DROP 2 -- ppp0 * 0.0.0.0/0 0.0.0.0/0
2 120 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0 state NEW
436 30360 ACCEPT all -- br0 * 0.0.0.0/0 0.0.0.0/0 state NEW
384 425K tarpit all -- * * 0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
40 24346 ACCEPT all -- oet1 * 0.0.0.0/0 0.0.0.0/0 state NEW
22115 16M SECURITY all -- * * 0.0.0.0/0 0.0.0.0/0
20685 16M ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
7 280 tarpit tcp -- * ppp0 !86.124.109.140 0.0.0.0/0 state INVALID
1423 234K upnp all -- * * 0.0.0.0/0 0.0.0.0/0
1423 234K lan2wan all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT tcp -- * ppp0 192.168.1.0/24 0.0.0.0/0 tcp dpt:1723
0 0 ACCEPT 47 -- * ppp0 192.168.1.0/24 0.0.0.0/0
0 0 TRIGGER all -- ppp0 br0 0.0.0.0/0 0.0.0.0/0 TRIGGER type:in match:0 relate:0
1423 234K trigger_out all -- br0 * 0.0.0.0/0 0.0.0.0/0
0 0 TRIGGER all -- ppp0 lan1 0.0.0.0/0 0.0.0.0/0 TRIGGER type:in match:0 relate:0
0 0 trigger_out all -- lan1 * 0.0.0.0/0 0.0.0.0/0
0 0 TRIGGER all -- ppp0 lan2 0.0.0.0/0 0.0.0.0/0 TRIGGER type:in match:0 relate:0
0 0 trigger_out all -- lan2 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- lan2 * 0.0.0.0/0 0.0.0.0/0 state NEW
0 0 TRIGGER all -- ppp0 lan3 0.0.0.0/0 0.0.0.0/0 TRIGGER type:in match:0 relate:0
0 0 trigger_out all -- lan3 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- lan3 * 0.0.0.0/0 0.0.0.0/0 state NEW
0 0 TRIGGER all -- ppp0 lan4 0.0.0.0/0 0.0.0.0/0 TRIGGER type:in match:0 relate:0
0 0 trigger_out all -- lan4 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- lan4 * 0.0.0.0/0 0.0.0.0/0 state NEW
0 0 TRIGGER all -- ppp0 oet1 0.0.0.0/0 0.0.0.0/0 TRIGGER type:in match:0 relate:0
0 0 trigger_out all -- oet1 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- oet1 * 0.0.0.0/0 0.0.0.0/0 state NEW
0 0 TRIGGER all -- ppp0 wan 0.0.0.0/0 0.0.0.0/0 TRIGGER type:in match:0 relate:0
0 0 trigger_out all -- wan * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- wan * 0.0.0.0/0 0.0.0.0/0 state NEW
0 0 TRIGGER all -- ppp0 wlan0 0.0.0.0/0 0.0.0.0/0 TRIGGER type:in match:0 relate:0
0 0 trigger_out all -- wlan0 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- wlan0 * 0.0.0.0/0 0.0.0.0/0 state NEW
0 0 TRIGGER all -- ppp0 wlan1 0.0.0.0/0 0.0.0.0/0 TRIGGER type:in match:0 relate:0
0 0 trigger_out all -- wlan1 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- wlan1 * 0.0.0.0/0 0.0.0.0/0 state NEW
1423 234K ACCEPT all -- br0 * 0.0.0.0/0 0.0.0.0/0 state NEW
0 0 tarpit all -- * * 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 4421 packets, 2432K bytes)
pkts bytes target prot opt in out source destination
Chain SECURITY (2 references)
pkts bytes target prot opt in out source destination
Chain advgrp_1 (0 references)
pkts bytes target prot opt in out source destination
Chain advgrp_10 (0 references)
pkts bytes target prot opt in out source destination
Chain advgrp_11 (0 references)
pkts bytes target prot opt in out source destination
Chain advgrp_12 (0 references)
pkts bytes target prot opt in out source destination
Chain advgrp_13 (0 references)
pkts bytes target prot opt in out source destination
Chain advgrp_14 (0 references)
pkts bytes target prot opt in out source destination
Chain advgrp_15 (0 references)
pkts bytes target prot opt in out source destination
Chain advgrp_16 (0 references)
pkts bytes target prot opt in out source destination
Chain advgrp_17 (0 references)
pkts bytes target prot opt in out source destination
Chain advgrp_18 (0 references)
pkts bytes target prot opt in out source destination
Chain advgrp_19 (0 references)
pkts bytes target prot opt in out source destination
Chain advgrp_2 (0 references)
pkts bytes target prot opt in out source destination
Chain advgrp_20 (0 references)
pkts bytes target prot opt in out source destination
Chain advgrp_3 (0 references)
pkts bytes target prot opt in out source destination
Chain advgrp_4 (0 references)
pkts bytes target prot opt in out source destination
Chain advgrp_5 (0 references)
pkts bytes target prot opt in out source destination
Chain advgrp_6 (0 references)
pkts bytes target prot opt in out source destination
Chain advgrp_7 (0 references)
pkts bytes target prot opt in out source destination
Chain advgrp_8 (0 references)
pkts bytes target prot opt in out source destination
Chain advgrp_9 (0 references)
pkts bytes target prot opt in out source destination
Chain grp_1 (0 references)
pkts bytes target prot opt in out source destination
Chain grp_10 (0 references)
pkts bytes target prot opt in out source destination
Chain grp_11 (0 references)
pkts bytes target prot opt in out source destination
Chain grp_12 (0 references)
pkts bytes target prot opt in out source destination
Chain grp_13 (0 references)
pkts bytes target prot opt in out source destination
Chain grp_14 (0 references)
pkts bytes target prot opt in out source destination
Chain grp_15 (0 references)
pkts bytes target prot opt in out source destination
Chain grp_16 (0 references)
pkts bytes target prot opt in out source destination
Chain grp_17 (0 references)
pkts bytes target prot opt in out source destination
Chain grp_18 (0 references)
pkts bytes target prot opt in out source destination
Chain grp_19 (0 references)
pkts bytes target prot opt in out source destination
Chain grp_2 (0 references)
pkts bytes target prot opt in out source destination
Chain grp_20 (0 references)
pkts bytes target prot opt in out source destination
Chain grp_3 (0 references)
pkts bytes target prot opt in out source destination
Chain grp_4 (0 references)
pkts bytes target prot opt in out source destination
Chain grp_5 (0 references)
pkts bytes target prot opt in out source destination
Chain grp_6 (0 references)
pkts bytes target prot opt in out source destination
Chain grp_7 (0 references)
pkts bytes target prot opt in out source destination
Chain grp_8 (0 references)
pkts bytes target prot opt in out source destination
Chain grp_9 (0 references)
pkts bytes target prot opt in out source destination
Chain lan2wan (1 references)
pkts bytes target prot opt in out source destination
Chain portscan (0 references)
pkts bytes target prot opt in out source destination
0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4 prefix "portscan:"
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain tarpit (3 references)
pkts bytes target prot opt in out source destination
391 426K DROP all -- * * 0.0.0.0/0 0.0.0.0/0
Chain trigger_out (9 references)
pkts bytes target prot opt in out source destination
Chain upnp (1 references)
pkts bytes target prot opt in out source destination
┌─[✓]─[root@DD-WRT:192.168.1.1]─[~]
└─iptables-legacy -vnL
Chain INPUT (policy ACCEPT 193 packets, 27469 bytes)
pkts bytes target prot opt in out source destination
Chain FORWARD (policy ACCEPT 206 packets, 34060 bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 239 packets, 50224 bytes)
pkts bytes target prot opt in out source destination[/list]
_________________ Internet provider https://en.wikipedia.org/wiki/RCS_%26_RDS 1Gbps
WDR3600 rev.1.5 - DD-Wrt
Linksys WRT1900ACS v.2 DD-Wrt/-OpenWrt
GL-MT6000 OpenWrt
https://ipv6.chappell-family.com/ipv6tcptest/
https://en.internet.nl/connection/e91f490fe1c54cb2b78145c0ab0d2b5a/results
http://www.dnssec-or-not.com/
https://dnscheck.tools/#results
Back to top
oliver44 DD-WRT Guru Joined: 01 Jun 2016 Posts: 538
Back to top
kernel-panic69 DD-WRT Guru Joined: 08 May 2018 Posts: 16899 Location: Texas, USA
Back to top
malventano DD-WRT Novice Joined: 08 Feb 2012 Posts: 23
Posted: Tue Dec 30, 2025 1:04 Post subject:
Upgraded a WRT32X from r62192 and got a new bugged section in Admin > Mgmt:
Description:
Filesize:
35.63 KB
Viewed:
7893 Time(s)
Back to top
WENED DD-WRT Guru Joined: 30 May 2017 Posts: 607 Location: Rural Manitoba
Posted: Tue Dec 30, 2025 2:11 Post subject:
1900ac V1 does not like this build or anything AFTER 62540.
Very long time to upgrade an then only starts with a power reset.
ubootenv command does not work.
Also when it did startup wireless was not working.
Upgrade done from partition 1.
Restored 62540 and now working again.
_________________ Starlink & DSL ->
WRT3200acm Master WDS 5GHz 80Mhz CH 100 (+6) -r64210
Ath1 2.4Ghz Disabled
99 Static Leases
ExpressVPN
WRT3200acm -r64210 WDS-5Ghz Client
WRT3200acm-r61465 Spare
WRT3200acm-r62170 Spare
WRT1900Ac V1 5Ghz -r64210 WDS Station
WRT1900AC V1 -r64210 WDS Station
WRT1900AC NoVPN on DSL r64210
WRT1900AC V1 5Ghz AC 80Mhz WDS-AP- - -r64137 2.4Ghz AP Ch1 HT20 Mixed
3200 Master -> LAN -> 1900 V1 -> WDS 5Ghz -> 1900 V1
3200 Master -> WDS -> 1900ACS Slave & 1900V1
Back to top
kernel-panic69 DD-WRT Guru Joined: 08 May 2018 Posts: 16899 Location: Texas, USA
Back to top
malventano DD-WRT Novice Joined: 08 Feb 2012 Posts: 23
Posted: Wed Dec 31, 2025 5:21 Post subject:
kernel-panic69 wrote: @malventano: reload the page or CTRL+F5 or the similar key pair on Mac.
Thanks, that sorted it. I didn't suspect caching since the snow bug was fixed in this build and that updated without needing a forced refresh.
Back to top