Asus RT-N13U B1 with power connection off(periodic)

Hi everybody,
I get a problem with my Asus RT-N13U B1. After the frequent turning off of the power connection, a problem began with the inability of the router to obtain an IP address (WAN - dynamic ip - is red). "Restart" - on LuCi - doesn't help me.
Updated the firmware to 22.03.2. Worked well for a few days. But...
Now disappears after turning off the power connection - Wi-Fi is down.
I tried to downgrade to 19.07.10.
Well, now WAN is getting internet and I have connection on my laptop via cable, Wi-Fi doesn't start, LuCi isn't available. It is impossible to access the router via the web. I was able to login via SSH. I tried to check if LuCi is installed - he writes that it installed.
Here is an example of what is in Putty.

root@OpenWrt:~# free
              total        used        free      shared  buff/cache   available
Mem:          60740        9116       41844          72        9780       34960
Swap:             0           0           0
root@OpenWrt:~# DOWNLOAD_LINK="https://downloads.openwrt.org/releases/22.03.2/ta
rgets/ramips/rt305x/openwrt-22.03.2-ramips-rt305x-asus_rt-n13u-squashfs-sysupgra
de.bin"; SHA256SUMS="https://downloads.openwrt.org/releases/22.03.2/targets/rami
ps/rt305x/sha256sums"
root@OpenWrt:~# cd /tmp;wget $DOWNLOAD_LINK;wget $SHA256SUMS;sha256sum -c sha256
sums 2>/dev/null|grep OK
wget: SSL support not available, please install one of the libustream-.*[ssl|tls                             ] packages as well as the ca-bundle and ca-certificates packages.
wget: SSL support not available, please install one of the libustream-.*[ssl|tls                             ] packages as well as the ca-bundle and ca-certificates packages.
root@OpenWrt:/tmp# opkg install luci --force-reinstall
Removing package luci from root...
Installing luci (git-22.099.58928-786ebc9-1) to root...
Collected errors:
 * opkg_download_pkg: Package luci is not available from any configured src.
 * opkg_install_pkg: Failed to download luci. Perhaps you need to run 'opkg update'?
 * opkg_install_cmd: Cannot install package luci.
root@OpenWrt:/tmp# opkg update
Downloading http://downloads.openwrt.org/releases/19.07.10/targets/ramips/rt305x/packages/Packages.gz
Updated list of available packages in /var/opkg-lists/openwrt_core
Downloading http://downloads.openwrt.org/releases/19.07.10/targets/ramips/rt305x/packages/Packages.sig
Signature check passed.
Downloading http://downloads.openwrt.org/releases/19.07.10/packages/mipsel_24kc/base/Packages.gz
Updated list of available packages in /var/opkg-lists/openwrt_base
Downloading http://downloads.openwrt.org/releases/19.07.10/packages/mipsel_24kc/base/Packages.sig
Signature check passed.
Downloading http://downloads.openwrt.org/releases/19.07.10/packages/mipsel_24kc/freifunk/Packages.gz
Updated list of available packages in /var/opkg-lists/openwrt_freifunk
Downloading http://downloads.openwrt.org/releases/19.07.10/packages/mipsel_24kc/freifunk/Packages.sig
Signature check passed.
Downloading http://downloads.openwrt.org/releases/19.07.10/packages/mipsel_24kc/luci/Packages.gz
Updated list of available packages in /var/opkg-lists/openwrt_luci
Downloading http://downloads.openwrt.org/releases/19.07.10/packages/mipsel_24kc/luci/Packages.sig
Signature check passed.
Downloading http://downloads.openwrt.org/releases/19.07.10/packages/mipsel_24kc/packages/Packages.gz
Updated list of available packages in /var/opkg-lists/openwrt_packages
Downloading http://downloads.openwrt.org/releases/19.07.10/packages/mipsel_24kc/packages/Packages.sig
Signature check passed.
Downloading http://downloads.openwrt.org/releases/19.07.10/packages/mipsel_24kc/routing/Packages.gz
Updated list of available packages in /var/opkg-lists/openwrt_routing
Downloading http://downloads.openwrt.org/releases/19.07.10/packages/mipsel_24kc/routing/Packages.sig
Signature check passed.
Downloading http://downloads.openwrt.org/releases/19.07.10/packages/mipsel_24kc/telephony/Packages.gz
Updated list of available packages in /var/opkg-lists/openwrt_telephony
Downloading http://downloads.openwrt.org/releases/19.07.10/packages/mipsel_24kc/telephony/Packages.sig
Signature check passed.
root@OpenWrt:/tmp# opkg install luci
Installing luci (git-22.115.68448-712bc8e-1) to root...
Collected errors:
 * verify_pkg_installable: Only have 0kb available on filesystem /overlay, pkg luci needs 1
 * opkg_install_cmd: Cannot install package luci.
root@OpenWrt:/tmp# DOWNLOAD_LINK="https://downloads.openwrt.org/releases/22.03.2/targets/ramips/rt305x/openwr
t-22.03.2-ramips-rt305x-asus_rt-n13u-squashfs-sysupgrade.bin"; SHA256SUMS="https://downloads.openwrt.org/rele
ases/22.03.2/targets/ramips/rt305x/sha256sums"
root@OpenWrt:/tmp# d /tmp;wget $DOWNLOAD_LINK;wget $SHA256SUMS;sha256sum -c sha256sums 2>/dev/null|grep OK
-ash: d: not found
wget: SSL support not available, please install one of the libustream-.*[ssl|tls] packages as well as the ca-bundle and ca-certificates packages.
wget: SSL support not available, please install one of the libustream-.*[ssl|tls] packages as well as the ca-bundle and ca-certificates packages.
root@OpenWrt:/tmp# DOWNLOAD_LINK="https://downloads.openwrt.org/snapshots/targets/ramips/rt305x/openwrt-ramip
s-rt305x-asus_rt-n13u-initramfs-kernel.bin"; SHA256SUMS="https://downloads.openwrt.org/releases/22.03.2/targe
ts/ramips/rt305x/sha256sums"
root@OpenWrt:/tmp# cd /tmp;wget $DOWNLOAD_LINK;wget $SHA256SUMS;sha256sum -c sha256sums 2>/dev/null|grep OK
wget: SSL support not available, please install one of the libustream-.*[ssl|tls] packages as well as the ca-bundle and ca-certificates packages.
wget: SSL support not available, please install one of the libustream-.*[ssl|tls] packages as well as the ca-bundle and ca-certificates packages.
root@OpenWrt:/tmp#

Accordingly the question. How can I flash the router completely to firmware 07/19/10 and have web access available (LuCi)?

Luci is available by default in stable images. You don't need to reinstall it, or you'll occupy more space on the device. Also when you download a big file, like a new image, prefer to store it in /tmp, otherwise you'll occupy all the available space of your device.
Command free shows the available memory, to the device space use df -h

Is there anything in the log, maybe related to the flash?

how to get logs without web -LuCi?

As I think, It's my fault that there are two firmwares. 19.07.10 and 22.03.2
So, I guess I have to force reinstall all.

Sorry, getting the logs is clear to me: Just connect via SSH and issue logread.

You don't need to force reinstall anything. As soon as you flash the new image without keeping configuration ypu'll have a clean installation with luci.

It's ok. I'll set it up again for my settings.
When I had 19.07.10 - I didn't have any issues with Wi-Fi and WAN. Now, I have many troubles.

root@OpenWrt:~# logread
Mon Apr 18 00:06:42 2022 kern.notice kernel: [    0.000000] Linux version 4.14.275 (builder@buildhost) (gcc version 7.5.0 (OpenWrt GCC 7.5.0 r11427-9ce6aa9d8d)) #0 Sat Apr 16 13:13:32 2022
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.000000] SoC Type: Ralink RT3052 id:1 rev:3
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.000000] bootconsole [early0] enabled
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.000000] CPU0 revision is: 0001964c (MIPS 24KEc)
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.000000] MIPS: machine is Asus RT-N13U
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.000000] Determined physical RAM map:
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.000000]  memory: 04000000 @ 00000000 (usable)
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.000000] Initrd not found or empty - disabling initrd
Mon Apr 18 00:06:42 2022 kern.warn kernel: [    0.000000] Primary instruction cache 32kB, VIPT, 4-way, linesize 32 bytes.
Mon Apr 18 00:06:42 2022 kern.warn kernel: [    0.000000] Primary data cache 16kB, 4-way, VIPT, no aliases, linesize 32 bytes
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.000000] Zone ranges:
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.000000]   Normal   [mem 0x0000000000000000-0x0000000003ffffff]
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.000000] Movable zone start for each node
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.000000] Early memory node ranges
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.000000]   node   0: [mem 0x0000000000000000-0x0000000003ffffff]
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.000000] Initmem setup node 0 [mem 0x0000000000000000-0x0000000003ffffff]
Mon Apr 18 00:06:42 2022 kern.debug kernel: [    0.000000] On node 0 totalpages: 16384
Mon Apr 18 00:06:42 2022 kern.debug kernel: [    0.000000] free_area_init_node: node 0, pgdat 803d9580, node_mem_map 81000040
Mon Apr 18 00:06:42 2022 kern.debug kernel: [    0.000000]   Normal zone: 128 pages used for memmap
Mon Apr 18 00:06:42 2022 kern.debug kernel: [    0.000000]   Normal zone: 0 pages reserved
Mon Apr 18 00:06:42 2022 kern.debug kernel: [    0.000000]   Normal zone: 16384 pages, LIFO batch:3
Mon Apr 18 00:06:42 2022 kern.notice kernel: [    0.000000] random: get_random_bytes called from 0x803da6ec with crng_init=0
Mon Apr 18 00:06:42 2022 kern.debug kernel: [    0.000000] pcpu-alloc: s0 r0 d32768 u32768 alloc=1*32768
Mon Apr 18 00:06:42 2022 kern.debug kernel: [    0.000000] pcpu-alloc: [0] 0
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.000000] Built 1 zonelists, mobility grouping on.  Total pages: 16256
Mon Apr 18 00:06:42 2022 kern.notice kernel: [    0.000000] Kernel command line: console=ttyS0,57600 rootfstype=squashfs,jffs2
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.000000] PID hash table entries: 256 (order: -2, 1024 bytes)
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.000000] Dentry cache hash table entries: 8192 (order: 3, 32768 bytes)
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.000000] Inode-cache hash table entries: 4096 (order: 2, 16384 bytes)
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.000000] Writing ErrCtl register=0000004b
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.000000] Readback ErrCtl register=0000004b
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.000000] Memory: 57452K/65536K available (3329K kernel code, 174K rwdata, 432K rodata, 3288K init, 199K bss, 8084K reserved, 0K cma-reserved)
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.000000] SLUB: HWalign=32, Order=0-3, MinObjects=0, CPUs=1, Nodes=1
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.000000] NR_IRQS: 256
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.000000] CPU Clock: 384MHz
Mon Apr 18 00:06:42 2022 kern.crit kernel: [    0.000000] timer_probe: no matching timers found
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.000000] clocksource: MIPS: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 9954481493 ns
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.000014] sched_clock: 32 bits at 192MHz, resolution 5ns, wraps every 11184811005ns
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.015733] Calibrating delay loop... 255.59 BogoMIPS (lpj=1277952)
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.108148] pid_max: default: 32768 minimum: 301
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.117677] Mount-cache hash table entries: 1024 (order: 0, 4096 bytes)
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.130788] Mountpoint-cache hash table entries: 1024 (order: 0, 4096 bytes)
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.151983] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.171545] futex hash table entries: 256 (order: -1, 3072 bytes)
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.183801] pinctrl core: initialized pinctrl subsystem
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.196200] NET: Registered protocol family 16
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.241821] rt2880_gpio 10000600.gpio: registering 24 gpios
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.252931] rt2880_gpio 10000600.gpio: registering 24 irq handlers
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.272347] clocksource: Switched to clocksource MIPS
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.284125] NET: Registered protocol family 2
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.293054] IP idents hash table entries: 2048 (order: 2, 16384 bytes)
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.307355] TCP established hash table entries: 1024 (order: 0, 4096 bytes)
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.321223] TCP bind hash table entries: 1024 (order: 0, 4096 bytes)
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.333845] TCP: Hash tables configured (established 1024 bind 1024)
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.346728] UDP hash table entries: 256 (order: 0, 4096 bytes)
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.358337] UDP-Lite hash table entries: 256 (order: 0, 4096 bytes)
Mon Apr 18 00:06:42 2022 kern.info kernel: [    0.371092] NET: Registered protocol family 1
Mon Apr 18 00:06:42 2022 kern.notice kernel: [    2.622362] random: fast init done
Mon Apr 18 00:06:42 2022 kern.info kernel: [    6.199212] rt-timer 10000100.timer: maximum frequency is 3906Hz
Mon Apr 18 00:06:42 2022 kern.warn kernel: [    6.212625] Crashlog allocated RAM at address 0x3f00000
Mon Apr 18 00:06:42 2022 kern.info kernel: [    6.226327] workingset: timestamp_bits=30 max_order=14 bucket_order=0
Mon Apr 18 00:06:42 2022 kern.info kernel: [    6.248540] squashfs: version 4.0 (2009/01/31) Phillip Lougher
Mon Apr 18 00:06:42 2022 kern.info kernel: [    6.260118] jffs2: version 2.2 (NAND) (SUMMARY) (LZMA) (RTIME) (CMODE_PRIORITY) (c) 2001-2006 Red Hat, Inc.
Mon Apr 18 00:06:42 2022 kern.info kernel: [    6.388481] io scheduler noop registered
Mon Apr 18 00:06:42 2022 kern.info kernel: [    6.396236] io scheduler deadline registered (default)
Mon Apr 18 00:06:42 2022 kern.info kernel: [    6.407221] Serial: 8250/16550 driver, 16 ports, IRQ sharing enabled
Mon Apr 18 00:06:42 2022 kern.info kernel: [    6.424681] console [ttyS0] disabled
Mon Apr 18 00:06:42 2022 kern.info kernel: [    6.431727] 10000c00.uartlite: ttyS0 at MMIO 0x10000c00 (irq = 20, base_baud = 8000000) is a Palmchip BK-3103
Mon Apr 18 00:06:42 2022 kern.info kernel: [    6.451570] console [ttyS0] enabled
Mon Apr 18 00:06:42 2022 kern.info kernel: [    6.465483] bootconsole [early0] disabled
Mon Apr 18 00:06:42 2022 kern.info kernel: [    6.483527] 1f000000.cfi: Found 1 x16 devices at 0x0 in 16-bit bank. Manufacturer ID 0x0000c2 Chip ID 0x0022cb
Mon Apr 18 00:06:42 2022 kern.info kernel: [    6.503805] Amd/Fujitsu Extended Query Table at 0x0040
Mon Apr 18 00:06:42 2022 kern.info kernel: [    6.514213]   Amd/Fujitsu Extended Query version 1.1.
Mon Apr 18 00:06:42 2022 kern.notice kernel: [    6.524424] number of CFI chips: 1
Mon Apr 18 00:06:42 2022 kern.notice kernel: [    6.571104] 4 fixed-partitions partitions found on MTD device 1f000000.cfi
Mon Apr 18 00:06:42 2022 kern.notice kernel: [    6.585038] Creating 4 MTD partitions on "1f000000.cfi":
Mon Apr 18 00:06:42 2022 kern.notice kernel: [    6.595788] 0x000000000000-0x000000030000 : "u-boot"
Mon Apr 18 00:06:42 2022 kern.notice kernel: [    6.607294] 0x000000030000-0x000000040000 : "u-boot-env"
Mon Apr 18 00:06:42 2022 kern.notice kernel: [    6.619521] 0x000000040000-0x000000050000 : "factory"
Mon Apr 18 00:06:42 2022 kern.notice kernel: [    6.631191] 0x000000050000-0x000000800000 : "firmware"
Mon Apr 18 00:06:42 2022 kern.info kernel: [    6.652993] rt3050-esw 10110000.esw: link changed 0x10
Mon Apr 18 00:06:42 2022 kern.info kernel: [    6.667967] mtk_soc_eth 10100000.ethernet eth0: mediatek frame engine at 0xb0100000, irq 5
Mon Apr 18 00:06:42 2022 kern.info kernel: [    6.685456] rt2880_wdt 10000120.watchdog: Initialized
Mon Apr 18 00:06:42 2022 kern.info kernel: [    6.697742] NET: Registered protocol family 10
Mon Apr 18 00:06:42 2022 kern.info kernel: [    6.713841] Segment Routing with IPv6
Mon Apr 18 00:06:42 2022 kern.info kernel: [    6.721393] NET: Registered protocol family 17
Mon Apr 18 00:06:42 2022 kern.info kernel: [    6.730527] bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this.
Mon Apr 18 00:06:42 2022 kern.info kernel: [    6.756684] 8021q: 802.1Q VLAN Support v1.8
Mon Apr 18 00:06:42 2022 kern.info kernel: [    6.792029] Freeing unused kernel memory: 3288K
Mon Apr 18 00:06:42 2022 kern.warn kernel: [    6.801210] This architecture does not have kernel memory protection.
Mon Apr 18 00:06:42 2022 user.info kernel: [    6.838599] init: Console is alive
Mon Apr 18 00:06:42 2022 user.info kernel: [    6.846004] init: - watchdog -
Mon Apr 18 00:06:42 2022 user.info kernel: [    6.882709] kmodloader: loading kernel modules from /etc/modules-boot.d/*
Mon Apr 18 00:06:42 2022 user.info kernel: [    6.905135] kmodloader: done loading kernel modules from /etc/modules-boot.d/*
Mon Apr 18 00:06:42 2022 user.info kernel: [    6.930485] init: - preinit -
Mon Apr 18 00:06:42 2022 kern.info kernel: [    7.273613] 8021q: adding VLAN 0 to HW filter on device eth0
Mon Apr 18 00:06:42 2022 kern.notice kernel: [    7.307684] random: procd: uninitialized urandom read (4 bytes read)
Mon Apr 18 00:06:42 2022 user.info kernel: [   10.537761] procd: - early -
Mon Apr 18 00:06:42 2022 user.info kernel: [   10.543962] procd: - watchdog -
Mon Apr 18 00:06:42 2022 user.info kernel: [   11.166064] procd: - watchdog -
Mon Apr 18 00:06:42 2022 user.info kernel: [   11.173185] procd: - ubus -
Mon Apr 18 00:06:42 2022 kern.notice kernel: [   11.189305] random: ubusd: uninitialized urandom read (4 bytes read)
Mon Apr 18 00:06:42 2022 kern.notice kernel: [   11.229263] random: ubusd: uninitialized urandom read (4 bytes read)
Mon Apr 18 00:06:42 2022 kern.notice kernel: [   11.243112] random: ubusd: uninitialized urandom read (4 bytes read)
Mon Apr 18 00:06:42 2022 user.info kernel: [   11.258461] procd: - init -
Mon Apr 18 00:06:42 2022 user.info kernel: [   11.938548] kmodloader: loading kernel modules from /etc/modules.d/*
Mon Apr 18 00:06:42 2022 kern.info kernel: [   11.986177] ip6_tables: (C) 2000-2006 Netfilter Core Team
Mon Apr 18 00:06:42 2022 kern.info kernel: [   12.028900] Loading modules backported from Linux version v4.19.237-0-ga6e4a1818efa
Mon Apr 18 00:06:42 2022 kern.info kernel: [   12.044437] Backport generated by backports.git v4.19.237-1-0-gffb89fd9
Mon Apr 18 00:06:42 2022 kern.info kernel: [   12.095688] ip_tables: (C) 2000-2006 Netfilter Core Team
Mon Apr 18 00:06:42 2022 kern.info kernel: [   12.133066] nf_conntrack version 0.5.0 (1024 buckets, 4096 max)
Mon Apr 18 00:06:42 2022 kern.info kernel: [   12.316815] xt_time: kernel timezone is -0000
Mon Apr 18 00:06:42 2022 kern.info kernel: [   12.470039] PPP generic driver version 2.4.2
Mon Apr 18 00:06:42 2022 kern.info kernel: [   12.493503] NET: Registered protocol family 24
Mon Apr 18 00:06:42 2022 kern.info kernel: [   12.578578] rt2800_wmac 10180000.wmac: loaded eeprom from mtd device "factory"
Mon Apr 18 00:06:42 2022 kern.info kernel: [   12.593263] ieee80211 phy0: rt2x00_set_rt: Info - RT chipset 2872, rev 0200 detected
Mon Apr 18 00:06:42 2022 kern.info kernel: [   12.608924] ieee80211 phy0: rt2x00_set_rf: Info - RF chipset 0008 detected
Mon Apr 18 00:06:42 2022 kern.debug kernel: [   12.623869] ieee80211 phy0: Selected rate control algorithm 'minstrel_ht'
Mon Apr 18 00:06:42 2022 user.info kernel: [   12.742776] kmodloader: done loading kernel modules from /etc/modules.d/*
Mon Apr 18 00:06:42 2022 user.info kernel: [   12.996497] urngd: v1.0.2 started.
Mon Apr 18 00:06:42 2022 kern.info kernel: [   13.344219] rt3050-esw 10110000.esw: link changed 0x00
Mon Apr 18 00:06:42 2022 kern.notice kernel: [   13.470371] random: crng init done
Mon Apr 18 00:06:42 2022 kern.notice kernel: [   13.477323] random: 6 urandom warning(s) missed due to ratelimiting
Mon Apr 18 00:06:42 2022 kern.info kernel: [   15.610980] rt3050-esw 10110000.esw: link changed 0x10
Mon Apr 18 00:06:42 2022 kern.info kernel: [   17.362637] rt3050-esw 10110000.esw: link changed 0x00
Mon Apr 18 00:06:43 2022 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Mon Apr 18 00:06:43 2022 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Mon Apr 18 00:06:44 2022 daemon.info dnsmasq[818]: started, version 2.80 cachesize 150
Mon Apr 18 00:06:44 2022 daemon.info dnsmasq[818]: DNS service limited to local subnets
Mon Apr 18 00:06:44 2022 daemon.info dnsmasq[818]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-nettlehash no-DNSSEC no-ID loop-detect inotify dumpfile
Mon Apr 18 00:06:44 2022 daemon.info dnsmasq[818]: using local addresses only for domain test
Mon Apr 18 00:06:44 2022 daemon.info dnsmasq[818]: using local addresses only for domain onion
Mon Apr 18 00:06:44 2022 daemon.info dnsmasq[818]: using local addresses only for domain localhost
Mon Apr 18 00:06:44 2022 daemon.info dnsmasq[818]: using local addresses only for domain local
Mon Apr 18 00:06:44 2022 daemon.info dnsmasq[818]: using local addresses only for domain invalid
Mon Apr 18 00:06:44 2022 daemon.info dnsmasq[818]: using local addresses only for domain bind
Mon Apr 18 00:06:44 2022 daemon.info dnsmasq[818]: using local addresses only for domain lan
Mon Apr 18 00:06:44 2022 daemon.warn dnsmasq[818]: no servers found in /tmp/resolv.conf.auto, will retry
Mon Apr 18 00:06:44 2022 daemon.info dnsmasq[818]: read /etc/hosts - 4 addresses
Mon Apr 18 00:06:44 2022 daemon.info dnsmasq[818]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Mon Apr 18 00:07:02 2022 authpriv.info dropbear[855]: Not backgrounding
Mon Apr 18 00:07:04 2022 user.notice : Added device handler type: 8021ad
Mon Apr 18 00:07:04 2022 user.notice : Added device handler type: 8021q
Mon Apr 18 00:07:04 2022 user.notice : Added device handler type: macvlan
Mon Apr 18 00:07:04 2022 user.notice : Added device handler type: veth
Mon Apr 18 00:07:04 2022 user.notice : Added device handler type: bridge
Mon Apr 18 00:07:04 2022 user.notice : Added device handler type: Network device
Mon Apr 18 00:07:04 2022 user.notice : Added device handler type: tunnel
Mon Apr 18 00:07:04 2022 daemon.notice procd: /etc/init.d/network: 'radio0' is disabled
Mon Apr 18 00:07:04 2022 daemon.notice procd: /etc/init.d/network: 'radio0' is disabled
Mon Apr 18 00:07:07 2022 user.notice ucitrack: Setting up /etc/config/network reload dependency on /etc/config/dhcp
Mon Apr 18 00:07:07 2022 user.notice ucitrack: Setting up /etc/config/network reload dependency on /etc/config/radvd
Mon Apr 18 00:07:07 2022 user.notice ucitrack: Setting up /etc/config/wireless reload dependency on /etc/config/network
Mon Apr 18 00:07:07 2022 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/luci-splash
Mon Apr 18 00:07:08 2022 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/qos
Mon Apr 18 00:07:08 2022 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/miniupnpd
Mon Apr 18 00:07:08 2022 user.notice ucitrack: Setting up /etc/config/dhcp reload dependency on /etc/config/odhcpd
Mon Apr 18 00:07:09 2022 user.notice ucitrack: Setting up non-init /etc/config/fstab reload handler: /sbin/block mount
Mon Apr 18 00:07:09 2022 user.notice ucitrack: Setting up /etc/config/system reload trigger for non-procd /etc/init.d/led
Mon Apr 18 00:07:09 2022 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/luci_statistics
Mon Apr 18 00:07:09 2022 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/dhcp
Mon Apr 18 00:07:11 2022 kern.info kernel: [   48.267223] 8021q: adding VLAN 0 to HW filter on device eth0
Mon Apr 18 00:07:11 2022 kern.info kernel: [   48.307415] br-lan: port 1(eth0.1) entered blocking state
Mon Apr 18 00:07:11 2022 kern.info kernel: [   48.318410] br-lan: port 1(eth0.1) entered disabled state
Mon Apr 18 00:07:11 2022 kern.info kernel: [   48.329902] device eth0.1 entered promiscuous mode
Mon Apr 18 00:07:11 2022 kern.info kernel: [   48.339649] device eth0 entered promiscuous mode
Mon Apr 18 00:07:12 2022 kern.info kernel: [   48.441788] br-lan: port 1(eth0.1) entered blocking state
Mon Apr 18 00:07:12 2022 kern.info kernel: [   48.452752] br-lan: port 1(eth0.1) entered forwarding state
Mon Apr 18 00:07:12 2022 kern.info kernel: [   48.464383] IPv6: ADDRCONF(NETDEV_UP): br-lan: link is not ready
Mon Apr 18 00:07:12 2022 daemon.notice netifd: Interface 'lan' is enabled
Mon Apr 18 00:07:12 2022 daemon.notice netifd: Interface 'lan' is setting up now
Mon Apr 18 00:07:12 2022 daemon.notice netifd: Interface 'lan' is now up
Mon Apr 18 00:07:12 2022 daemon.notice netifd: Interface 'loopback' is enabled
Mon Apr 18 00:07:12 2022 daemon.notice netifd: Interface 'loopback' is setting up now
Mon Apr 18 00:07:12 2022 daemon.notice netifd: Interface 'loopback' is now up
Mon Apr 18 00:07:12 2022 daemon.notice netifd: Interface 'wan' is enabled
Mon Apr 18 00:07:12 2022 daemon.notice netifd: Interface 'wan6' is enabled
Mon Apr 18 00:07:12 2022 daemon.notice netifd: bridge 'br-lan' link is up
Mon Apr 18 00:07:12 2022 daemon.notice netifd: Interface 'lan' has link connectivity
Mon Apr 18 00:07:12 2022 daemon.notice netifd: Network device 'eth0' link is up
Mon Apr 18 00:07:12 2022 daemon.notice netifd: VLAN 'eth0.1' link is up
Mon Apr 18 00:07:12 2022 daemon.notice netifd: Network device 'lo' link is up
Mon Apr 18 00:07:12 2022 daemon.notice netifd: Interface 'loopback' has link connectivity
Mon Apr 18 00:07:12 2022 daemon.notice netifd: VLAN 'eth0.2' link is up
Mon Apr 18 00:07:12 2022 daemon.notice netifd: Interface 'wan' has link connectivity
Mon Apr 18 00:07:12 2022 daemon.notice netifd: Interface 'wan' is setting up now
Mon Apr 18 00:07:12 2022 daemon.notice netifd: Interface 'wan6' has link connectivity
Mon Apr 18 00:07:12 2022 daemon.notice netifd: Interface 'wan6' is setting up now
Mon Apr 18 00:07:12 2022 kern.info kernel: [   49.263196] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
Mon Apr 18 00:07:13 2022 daemon.notice netifd: wan (1236): udhcpc: started, v1.30.1
Mon Apr 18 00:07:13 2022 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
Mon Apr 18 00:07:13 2022 daemon.err odhcpd[949]: Failed to send to ff02::1%lan@br-lan (Address not available)
Mon Apr 18 00:07:13 2022 daemon.err odhcp6c[1238]: Failed to send RS (Address not available)
Mon Apr 18 00:07:13 2022 daemon.notice netifd: wan (1236): udhcpc: sending discover
Mon Apr 18 00:07:14 2022 daemon.err odhcp6c[1238]: Failed to send DHCPV6 message to ff02::1:2 (Address not available)
Mon Apr 18 00:07:15 2022 daemon.info procd: - init complete -
Mon Apr 18 00:07:15 2022 daemon.info urandom_seed[1322]: Seed saved (/etc/urandom.seed)
Mon Apr 18 00:07:16 2022 daemon.notice netifd: wan (1236): udhcpc: sending discover
Mon Apr 18 00:07:19 2022 daemon.info dnsmasq[818]: exiting on receipt of SIGTERM
Mon Apr 18 00:07:19 2022 daemon.info dnsmasq[1381]: started, version 2.80 cachesize 150
Mon Apr 18 00:07:19 2022 daemon.info dnsmasq[1381]: DNS service limited to local subnets
Mon Apr 18 00:07:19 2022 daemon.info dnsmasq[1381]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-nettlehash no-DNSSEC no-ID loop-detect inotify dumpfile
Mon Apr 18 00:07:19 2022 daemon.info dnsmasq-dhcp[1381]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
Mon Apr 18 00:07:19 2022 daemon.info dnsmasq[1381]: using local addresses only for domain test
Mon Apr 18 00:07:19 2022 daemon.info dnsmasq[1381]: using local addresses only for domain onion
Mon Apr 18 00:07:19 2022 daemon.info dnsmasq[1381]: using local addresses only for domain localhost
Mon Apr 18 00:07:19 2022 daemon.info dnsmasq[1381]: using local addresses only for domain local
Mon Apr 18 00:07:19 2022 daemon.info dnsmasq[1381]: using local addresses only for domain invalid
Mon Apr 18 00:07:19 2022 daemon.info dnsmasq[1381]: using local addresses only for domain bind
Mon Apr 18 00:07:19 2022 daemon.info dnsmasq[1381]: using local addresses only for domain lan
Mon Apr 18 00:07:19 2022 daemon.warn dnsmasq[1381]: no servers found in /tmp/resolv.conf.auto, will retry
Mon Apr 18 00:07:19 2022 daemon.info dnsmasq[1381]: read /etc/hosts - 4 addresses
Mon Apr 18 00:07:19 2022 daemon.info dnsmasq[1381]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Mon Apr 18 00:07:19 2022 daemon.info dnsmasq-dhcp[1381]: read /etc/ethers - 0 addresses
Mon Apr 18 00:07:19 2022 daemon.info dnsmasq[1381]: read /etc/hosts - 4 addresses
Mon Apr 18 00:07:19 2022 daemon.info dnsmasq[1381]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Mon Apr 18 00:07:19 2022 daemon.info dnsmasq-dhcp[1381]: read /etc/ethers - 0 addresses
Mon Apr 18 00:07:19 2022 daemon.notice netifd: wan (1236): udhcpc: sending discover
Mon Apr 18 00:10:11 2022 kern.info kernel: [  227.522151] rt3050-esw 10110000.esw: link changed 0x10
Mon Apr 18 00:10:18 2022 daemon.notice netifd: wan (1236): udhcpc: sending select for 100.77.35.101
Mon Apr 18 00:10:19 2022 daemon.notice netifd: wan (1236): udhcpc: lease of 100.77.35.101 obtained, lease time 1800
Mon Apr 18 00:10:19 2022 daemon.notice netifd: Interface 'wan' is now up
Mon Apr 18 00:10:20 2022 daemon.info dnsmasq[1381]: reading /tmp/resolv.conf.auto
Mon Apr 18 00:10:20 2022 daemon.info dnsmasq[1381]: using local addresses only for domain test
Mon Apr 18 00:10:20 2022 daemon.info dnsmasq[1381]: using local addresses only for domain onion
Mon Apr 18 00:10:20 2022 daemon.info dnsmasq[1381]: using local addresses only for domain localhost
Mon Apr 18 00:10:20 2022 daemon.info dnsmasq[1381]: using local addresses only for domain local
Mon Apr 18 00:10:20 2022 daemon.info dnsmasq[1381]: using local addresses only for domain invalid
Mon Apr 18 00:10:20 2022 daemon.info dnsmasq[1381]: using local addresses only for domain bind
Mon Apr 18 00:10:20 2022 daemon.info dnsmasq[1381]: using local addresses only for domain lan
Mon Apr 18 00:10:20 2022 daemon.info dnsmasq[1381]: using nameserver 193.41.60.1#53
Mon Apr 18 00:10:20 2022 daemon.info dnsmasq[1381]: using nameserver 193.41.60.2#53
Mon Apr 18 00:10:20 2022 user.notice firewall: Reloading firewall due to ifup of wan (eth0.2)
Mon Dec 12 12:20:49 2022 daemon.notice netifd: wan (1236): udhcpc: sending renew to 193.41.60.7
Mon Dec 12 12:20:49 2022 daemon.notice netifd: wan (1236): udhcpc: lease of 100.77.35.101 obtained, lease time 21600
Mon Dec 12 12:20:49 2022 user.notice firewall: Reloading firewall due to ifupdate of wan (eth0.2)
Mon Dec 12 15:12:30 2022 kern.info kernel: [11436.719036] rt3050-esw 10110000.esw: link changed 0x11
Mon Dec 12 15:12:37 2022 kern.info kernel: [11443.623953] rt3050-esw 10110000.esw: link changed 0x10
Mon Dec 12 15:12:38 2022 kern.info kernel: [11445.369786] rt3050-esw 10110000.esw: link changed 0x11
Mon Dec 12 15:12:39 2022 daemon.info dnsmasq[1381]: read /etc/hosts - 4 addresses
Mon Dec 12 15:12:39 2022 daemon.info dnsmasq[1381]: read /tmp/hosts/odhcpd - 0 addresses
Mon Dec 12 15:12:39 2022 daemon.info dnsmasq[1381]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Mon Dec 12 15:12:39 2022 daemon.info dnsmasq-dhcp[1381]: read /etc/ethers - 0 addresses
Mon Dec 12 15:12:43 2022 daemon.info dnsmasq-dhcp[1381]: DHCPDISCOVER(br-lan) 192.168.1.106 a8:5e:45:c7:50:80
Mon Dec 12 15:12:43 2022 daemon.info dnsmasq-dhcp[1381]: DHCPOFFER(br-lan) 192.168.1.106 a8:5e:45:c7:50:80
Mon Dec 12 15:12:43 2022 daemon.info dnsmasq[1381]: read /etc/hosts - 4 addresses
Mon Dec 12 15:12:43 2022 daemon.info dnsmasq[1381]: read /tmp/hosts/odhcpd - 1 addresses
Mon Dec 12 15:12:43 2022 daemon.info dnsmasq[1381]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Mon Dec 12 15:12:43 2022 daemon.info dnsmasq-dhcp[1381]: read /etc/ethers - 0 addresses
Mon Dec 12 15:12:43 2022 daemon.info dnsmasq-dhcp[1381]: DHCPREQUEST(br-lan) 192.168.1.106 a8:5e:45:c7:50:80
Mon Dec 12 15:12:43 2022 daemon.info dnsmasq-dhcp[1381]: DHCPACK(br-lan) 192.168.1.106 a8:5e:45:c7:50:80 DESKTOP-4CSRHRS
Mon Dec 12 15:15:00 2022 authpriv.info dropbear[1692]: Child connection from 192.168.1.106:51398
Mon Dec 12 15:15:11 2022 authpriv.notice dropbear[1692]: Auth succeeded with blank password for 'root' from 192.168.1.106:51398
Mon Dec 12 15:15:35 2022 auth.err passwd: password for root changed by root
Mon Dec 12 15:17:29 2022 authpriv.info dropbear[1692]: Exit (root): Exited normally
Mon Dec 12 15:18:13 2022 authpriv.info dropbear[1708]: Child connection from 192.168.1.106:51490
Mon Dec 12 15:18:19 2022 authpriv.notice dropbear[1708]: Password auth succeeded for 'root' from 192.168.1.106:51490
Mon Dec 12 15:19:16 2022 authpriv.info dropbear[1708]: Exit (root): Error reading: Connection reset by peer
Mon Dec 12 15:19:22 2022 authpriv.info dropbear[1718]: Child connection from 192.168.1.106:51495
Mon Dec 12 15:19:32 2022 authpriv.notice dropbear[1718]: Password auth succeeded for 'root' from 192.168.1.106:51495

All time after power connection off openwrt loses the password.


=== WARNING! =====================================
There is no root password defined on this device!
Use the "passwd" command to set up a new password
in order to prevent unauthorized SSH logins.

This is happening because you have run out of space... evidenced by this:

In fact, this is likely the major issue you're dealing with. You need to reset your router to defaults

firstboot -y && reboot

This may not work if the filesystem is mounted read-only.
However, assuming it does work, when it is back up and running, please show us the results of the following:

ubus call system board
df -h

I can't do it...

root@OpenWrt:~# ubus call system board
{
        "kernel": "4.14.275",
        "hostname": "OpenWrt",
        "system": "Ralink RT3052 id:1 rev:3",
        "model": "Asus RT-N13U",
        "board_name": "rt-n13u",
        "release": {
                "distribution": "OpenWrt",
                "version": "19.07.10",
                "revision": "r11427-9ce6aa9d8d",
                "target": "ramips/rt305x",
                "description": "OpenWrt 19.07.10 r11427-9ce6aa9d8d"
        }
}
root@OpenWrt:~# df -h
Filesystem                Size      Used Available Use% Mounted on
tmpfs                    29.7M    812.0K     28.9M   3% /tmp
tmpfs                   512.0K         0    512.0K   0% /dev
root@OpenWrt:~# firstboot -y && reboot
MTD partition 'rootfs_data' not found


This means that your system is mounted read only.

You will need to use failsafe mode to reset your router.

I tried that at first. but I failed. I didn't do it.

Please describe how you failed... this is probably the simplest way you are going to get your router working properly, so it is worth understanding what went wrong.

ok at first...

grep squash /proc/mounts
The terminal should return something similar to this:

/dev/root /rom squashfs ro,relatime 0 0

I've got nothing.

root@OpenWrt:~# grep squash /proc/mounts
root@OpenWrt:~# grep squash /proc/mounts
root@OpenWrt:~#

is this after starting in failsafe mode?

To enter the failsafe mode:
I turn on the router, literally after a few seconds it starts flashing, I press the "Reset" button.
I go to SSH. I enter the command...

root@(none):~# mount_root
mounting /dev/root
root@(none):~# firstboot && reboot now
This will erase all settings and remove any installed packages. Are you sure? [N/y]
y
MTD partition 'rootfs_data' not found

Ok... I'm not sure why that is happening. But maybe the best option at this point is to use the TFTP firmware install method. Download a fresh copy of OpenWrt (I recommend 22.03.2).

You'll probably need to use the kernel version first for the TFTP process, then once booted into OpenWrt for the 'first time' run the sysupgrde using the sysupgrade image... so download both. EDIT: it looks like you should be able to use the sysupgrade image directly, based on the documentation from the above page.
https://firmware-selector.openwrt.org/?version=22.03.2&target=ramips%2Frt305x&id=asus_rt-n13u

so, what do you mean?
To use TFTP method?

I can't connet via TFTP.
I power on the router with pushed reset button. With opened TFTPD64...waiting..and nothing.
of course I've change the local LAN IP address of my laptop to the static IP (192.168.1.1)

maybe I'm not doing it right?