I just received my Flint 3 and I decided to try 4.8.1 beta.
I turned ON a VPN tunnel (tried OPVPN and Wireguard - I currently use Proton) and I enabled Adguard Home using NextDNS as Upstream DNS servers (tried H3, Quic, TLS).
Doing some dns leak tests on Browserleaks and Dnsleaktest everything seems fine BUT one thing bothers me: on NextDNS logs I see that my requests are from my WAN (my real IP) instead of my VPN Tunnel.
Tried this even on my Flint 2 with 4.8.0 beta and I had the same IP leak on NextDNS.
Then I tried reverting to 4.7.14 and everything is working as expected: on my NextDNS logs I see my VPN Tunnel address instead of my real IP...
To be short, I tested it on Flint 3 v4.8.1 firmware and it didn't reproduce this issue. Please let me know what features you enable and configure, or say how to reproduce?
That's the right settings.
However, My LAN1 port is set to WAN and I have a multi-WAN setup in failover mode.
EDIT: In Adguard Home I've chosen "parallel requests" instead of "load balancing", try also using H3 and QUIC please, as they seems the cause of the leak.
From what I've experienced H3 and QUIC basically makes the leak to appear instantly.
But it also happens even using TSL, with the only difference that it seems it requires more connection time to appear.
So, after further testing, the issue is really easy replicable on my side with both Flint 3 and Flint 2.
Any protocols cause leaks in Adguard Home with HTTPS being the less affected (requires more connection time and has less leaks).
Basically Adguard Home is totally unreliable in this state...
You are asking an aweful lot of a consumer grade device. You should probably have a pc setup with proxmox and opnsense, and use this flint 3 as a wifi ap and maybe tailscale server.
Wowsers. I thought GL.iNet's quality testing would be better than this. Is it not safe and secure to use 4.8? What can I do in the meantime to secure the router without downgrading the firmware?
Just tried firmware 4.8.1 2025-08-20, seems that the issue has been completely resolved!
Also, average DNS resolution time has returned to be low, I forgot to mention that it was crazy high with previous firmware (70-100ms).