Mudi GL-E750 Repeater not working

Model: GL.iNet GL-E750
Kernel version: Kernel Version 5.10.176
Affected firmware: 4.3.12 and above

I reviewed another post with similar title and issue, but that post did not offer solutions

prepare connect 'obscured)', WPA2 PSK (CCMP) channel 11
Thu Nov 21 16:44:06 2024 daemon.info lua: (...6e/ipkg-mips_24kc/gl-sdk4-repeater/usr/sbin/repeater:1506) connecting 'obscured'...
Thu Nov 21 16:44:06 2024 daemon.notice hostapd: Remove interface 'wlan0'
Thu Nov 21 16:44:06 2024 daemon.notice hostapd: wlan0: interface state ENABLED->DISABLED
Thu Nov 21 16:44:06 2024 daemon.notice hostapd: wlan0: AP-DISABLED
Thu Nov 21 16:44:06 2024 daemon.notice hostapd: wlan0: CTRL-EVENT-TERMINATING
Thu Nov 21 16:44:06 2024 daemon.err hostapd: rmdir[ctrl_interface=/var/run/hostapd]: Permission denied
Thu Nov 21 16:44:06 2024 daemon.notice hostapd: nl80211: deinit ifname=wlan0 disabled_11b_rates=0
Thu Nov 21 16:44:06 2024 kern.info kernel: [  721.780721] device wlan0 left promiscuous mode
Thu Nov 21 16:44:06 2024 kern.info kernel: [  721.780880] br-lan: port 3(wlan0) entered disabled state
Thu Nov 21 16:44:06 2024 daemon.notice netifd: Network device 'wlan0' link is down
Thu Nov 21 16:44:06 2024 daemon.notice netifd: Wireless device 'radio1' is now down
Thu Nov 21 16:44:06 2024 daemon.err hostapd: rmdir[ctrl_interface=/var/run/hostapd]: Permission denied
Thu Nov 21 16:44:06 2024 daemon.notice hostapd: wlan1: interface state ENABLED->DISABLED
Thu Nov 21 16:44:06 2024 daemon.notice hostapd: wlan1: AP-DISABLED
Thu Nov 21 16:44:06 2024 daemon.notice hostapd: wlan1: CTRL-EVENT-TERMINATING
Thu Nov 21 16:44:06 2024 daemon.err hostapd: rmdir[ctrl_interface=/var/run/hostapd]: Permission denied
Thu Nov 21 16:44:06 2024 daemon.notice hostapd: nl80211: deinit ifname=wlan1 disabled_11b_rates=0
Thu Nov 21 16:44:06 2024 kern.info kernel: [  722.215092] device wlan1 left promiscuous mode
Thu Nov 21 16:44:06 2024 kern.info kernel: [  722.215240] br-lan: port 2(wlan1) entered disabled state
Thu Nov 21 16:44:09 2024 kern.err kernel: [  725.296558] ath10k_pci 0000:00:00.0: failed to receive initialized event from target: 00000000
Thu Nov 21 16:44:11 2024 daemon.notice netifd: Network device 'wlan1' link is down
Thu Nov 21 16:44:12 2024 daemon.warn netifd: Wireless device 'radio0' setup failed, retry=3
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649): Command failed: ubus call hostapd config_remove {"iface":"wlan1"} (Invalid argument)
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649): Usage: ubus [<options>] <command> [arguments...]
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649): Options:
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649):  -s <socket>:		Set the unix domain socket to connect to
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649):  -t <timeout>:		Set the timeout (in seconds) for a command to complete
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649):  -S:			Use simplified output (for scripts)
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649):  -v:			More verbose output
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649):  -m <type>:		(for monitor): include a specific message type
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649): 			(can be used more than once)
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649):  -M <r|t>		(for monitor): only capture received or transmitted traffic
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649):
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649): Commands:
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649):  - list [<path>]			List objects
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649):  - call <path> <method> [<message>]	Call an object method
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649):  - subscribe <path> [<path>...]	Subscribe to object(s) notifications
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649):  - listen [<path>...]			Listen for events
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649):  - send <type> [<message>]		Send an event
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649):  - wait_for <object> [<object>...]	Wait for multiple objects to appear on ubus
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649):  - monitor				Monitor ubus traffic
Thu Nov 21 16:44:13 2024 daemon.notice netifd: radio0 (15649):
Thu Nov 21 16:44:13 2024 daemon.info lua: (...6e/ipkg-mips_24kc/gl-sdk4-repeater/usr/sbin/repeater:541) wait wpa_supplicant run...
Thu Nov 21 16:44:14 2024 daemon.notice netifd: Wireless device 'radio0' is now down
Thu Nov 21 16:44:14 2024 daemon.info lua: (...6e/ipkg-mips_24kc/gl-sdk4-repeater/usr/sbin/repeater:541) wait wpa_supplicant run...
Thu Nov 21 16:44:15 2024 daemon.info lua: (...6e/ipkg-mips_24kc/gl-sdk4-repeater/usr/sbin/repeater:582) load config...
Thu Nov 21 16:44:15 2024 daemon.info lua: (...6e/ipkg-mips_24kc/gl-sdk4-repeater/usr/sbin/repeater:630) shutdown wlan-sta0

It appears as if the user calling hostapd does not have permissions. the command ls -la /var/run/hostapd shows:

drwxr-xr-x    2 network  network        100 Nov 21 17:14 hostapd

ps shows

ps | grep hostapd
30560 root      2656 S    {hostapd} /sbin/ujail -t 5 -n hostapd -U network -G ne
30565 network   5272 S    /usr/sbin/hostapd -s -g /var/run/hostapd/global
30777 root      1312 S    grep hostapd

df -h shows

/dev/root                15.3M     15.3M         0 100% /rom
tmpfs                    59.2M    340.0K     58.8M   1% /tmp
/dev/ubi0_1              96.1M    244.0K     91.1M   0% /overlay
overlayfs:/overlay       96.1M    244.0K     91.1M   0% /
tmpfs                   512.0K         0    512.0K   0% /dev

free shows

              total        used        free      shared  buff/cache   available
Mem:         121188       36208       50076         368       34904       65520
Swap:             0           0           0

Downgrading to 3.217 made repeater work again, but the downgrade makes me vulnerable to CVE-2024-39225 and CVE-2024-39227 with a CVSS score of 9.8 (all versions before V4.3.12 and earlier are affected according to advisory).

I rely on using repeater. Can anyone suggest solutions?

Hi,

Please PM me the issue syslog, thank you.

I sent the syslog as a zip file, since copy paste exceeded the character limit for private messages.