Using either stable 4.2.2 or beta 4.2.3 release1, DNS is listening and responding on the WAN interface. While this should be implicitly blocked, even creating an explicit rule does not block tcp 53 from the WAN interface.
Snapshot 4.3.2 2023-06-20 12:53:33 (UTC-05:00) does not exhibit this behavior. No other versions tested.
Steps to reproduce:
- Factory reset device.
- Connect to WiFi network with Repeater mode (example: “public_wifi”)
- nmap the Beryl AX from “public_wifi”
- nslookup/dig using Beryl AX as server, from “public_wifi”