Model: GL.iNet GL-E750
Kernel version: Kernel Version 5.10.176
Affected firmware: 4.3.12 and above
I reviewed another post with similar title and issue, but that post did not offer solutions
prepare connect 'obscured)', WPA2 PSK (CCMP) channel 11
Thu Nov 21 16:44:06 2024 daemon.info lua: (...6e/ipkg-mips_24kc/gl-sdk4-repeater/usr/sbin/repeater:1506) connecting 'obscured'...
Thu Nov 21 16:44:06 2024 daemon.notice hostapd: Remove interface 'wlan0'
Thu Nov 21 16:44:06 2024 daemon.notice hostapd: wlan0: interface state ENABLED->DISABLED
Thu Nov 21 16:44:06 2024 daemon.notice hostapd: wlan0: AP-DISABLED
Thu Nov 21 16:44:06 2024 daemon.notice hostapd: wlan0: CTRL-EVENT-TERMINATING
Thu Nov 21 16:44:06 2024 daemon.err hostapd: rmdir[ctrl_interface=/var/run/hostapd]: Permission denied
Thu Nov 21 16:44:06 2024 daemon.notice hostapd: nl80211: deinit ifname=wlan0 disabled_11b_rates=0
Thu Nov 21 16:44:06 2024 kern.info kernel: [ 721.780721] device wlan0 left promiscuous mode
Thu Nov 21 16:44:06 2024 kern.info kernel: [ 721.780880] br-lan: port 3(wlan0) entered disabled state
Thu Nov 21 16:44:06 2024 daemon.notice netifd: Network device 'wlan0' link is down
Thu Nov 21 16:44:06 2024 daemon.notice netifd: Wireless device 'radio1' is now down
Thu Nov 21 16:44:06 2024 daemon.err hostapd: rmdir[ctrl_interface=/var/run/hostapd]: Permission denied
Thu Nov 21 16:44:06 2024 daemon.notice hostapd: wlan1: interface state ENABLED->DISABLED
Thu Nov 21 16:44:06 2024 daemon.notice hostapd: wlan1: AP-DISABLED
Thu Nov 21 16:44:06 2024 daemon.notice hostapd: wlan1: CTRL-EVENT-TERMINATING
Thu Nov 21 16:44:06 2024 daemon.err hostapd: rmdir[ctrl_interface=/var/run/hostapd]: Permission denied
Thu Nov 21 16:44:06 2024 daemon.notice hostapd: nl80211: deinit ifname=wlan1 disabled_11b_rates=0
Thu Nov 21 16:44:06 2024 kern.info kernel: [ 722.215092] device wlan1 left promiscuous mode
Thu Nov 21 16:44:06 2024 kern.info kernel: [ 722.215240] br-lan: port 2(wlan1) entered disabled state
Thu Nov 21 16:44:09 2024 kern.err kernel: [ 725.296558] ath10k_pci 0000:00:00.0: failed to receive initialized event from target: 00000000
Thu Nov 21 16:44:11 2024 daemon.notice netifd: Network device 'wlan1' link is down
Thu Nov 21 16:44:12 2024 daemon.warn netifd: Wireless device 'radio0' setup failed, retry=3
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649): Command failed: ubus call hostapd config_remove {"iface":"wlan1"} (Invalid argument)
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649): Usage: ubus [<options>] <command> [arguments...]
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649): Options:
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649): -s <socket>: Set the unix domain socket to connect to
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649): -t <timeout>: Set the timeout (in seconds) for a command to complete
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649): -S: Use simplified output (for scripts)
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649): -v: More verbose output
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649): -m <type>: (for monitor): include a specific message type
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649): (can be used more than once)
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649): -M <r|t> (for monitor): only capture received or transmitted traffic
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649):
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649): Commands:
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649): - list [<path>] List objects
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649): - call <path> <method> [<message>] Call an object method
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649): - subscribe <path> [<path>...] Subscribe to object(s) notifications
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649): - listen [<path>...] Listen for events
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649): - send <type> [<message>] Send an event
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649): - wait_for <object> [<object>...] Wait for multiple objects to appear on ubus
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649): - monitor Monitor ubus traffic
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649):
Thu Nov 21 16:44:13 2024 daemon.info lua: (...6e/ipkg-mips_24kc/gl-sdk4-repeater/usr/sbin/repeater:541) wait wpa_supplicant run...
Thu Nov 21 16:44:14 2024 daemon.notice netifd: Wireless device 'radio0' is now down
Thu Nov 21 16:44:14 2024 daemon.info lua: (...6e/ipkg-mips_24kc/gl-sdk4-repeater/usr/sbin/repeater:541) wait wpa_supplicant run...
Thu Nov 21 16:44:15 2024 daemon.info lua: (...6e/ipkg-mips_24kc/gl-sdk4-repeater/usr/sbin/repeater:582) load config...
Thu Nov 21 16:44:15 2024 daemon.info lua: (...6e/ipkg-mips_24kc/gl-sdk4-repeater/usr/sbin/repeater:630) shutdown wlan-sta0
It appears as if the user calling hostapd does not have permissions. the command ls -la /var/run/hostapd shows:
drwxr-xr-x 2 network network 100 Nov 21 17:14 hostapd
ps shows
ps | grep hostapd
30560 root 2656 S {hostapd} /sbin/ujail -t 5 -n hostapd -U network -G ne
30565 network 5272 S /usr/sbin/hostapd -s -g /var/run/hostapd/global
30777 root 1312 S grep hostapd
df -h shows
/dev/root 15.3M 15.3M 0 100% /rom
tmpfs 59.2M 340.0K 58.8M 1% /tmp
/dev/ubi0_1 96.1M 244.0K 91.1M 0% /overlay
overlayfs:/overlay 96.1M 244.0K 91.1M 0% /
tmpfs 512.0K 0 512.0K 0% /dev
free shows
total used free shared buff/cache available
Mem: 121188 36208 50076 368 34904 65520
Swap: 0 0 0
Downgrading to 3.217 made repeater work again, but the downgrade makes me vulnerable to CVE-2024-39225 and CVE-2024-39227 with a CVSS score of 9.8 (all versions before V4.3.12 and earlier are affected according to advisory).
I rely on using repeater. Can anyone suggest solutions?