FYI
Just did an attended sysupgrade upgrade from 24.10.3 -> 24.10.4.
Worked flawless.
Does 2.5G work? ima getting this device soon.
Yes.
Note: Asus has discontinued the AX4200/AX6000 globally, so hurry if you can find it in stock. Replacement is BT6/BT8.
Yes. They both have the 802.11be standard.
Here is the difference :
Upgrade wasn't the issue. Short version: potentially bad flash on one unit due to my switch's "anti-DoS" setting. Stable for weeks, then just randomly started bootlooping. Soft and hard resets did nothing. Failsafe mode still worked but no fix worked.
For catastrophic recovery (or bootloader upgrade):
- Enter recovery (turn off, hold reset, turn on, wait for LED top light to turn red, release reset button)
- Flash remittor's UBI cleaner TRX via Asus recovery software (unit will stop bootlooping after this)
- Flash latest Asus firmware via Asus recovery software
(Set IP: 192.168.1.10 255.255.255.0) - Enter Asus router OEM software and flash remittor's 24 latest TRX.
- Enter openwrt and flash latest openwrt sysupgrade.
Note: Asus recovery software is windows only AFAIK.
I can confirm that you can move from the old bootloader to the new bootloader via this process. These units seem unbrickable. Hopefully this solves my issue.
This is yet a reminder to everyone here to download the above--just in case you need it.
Maybe someone put the above in the wiki for Asus filogic units? ![]()
Any benefit installing the new bootloader?
My TRX images don't change the bootloader! To install the stock firmware, you can use the facinstall package or install my custom OpenWrt firmware.
I know. #3 is flashing ASUS latest firmware TRX which includes the new bootloader.
#2 is your UBI cleaner TRX not the correct way back to OEM?
4a27fd2584e4f9d75cdaf2fc2c1ac3d1 asus_tuf-ax6000-ubi-cleaner.trx
None that I could find. I can only really confirm you won't hard brick them upgrading to new. Note: Asus removed all old firmware with old bootloaders. ASUS TUF-AX6000 Firmware version 3.0.0.4.388_33419 is the oldest for me (has new). Going from new -> old will likely end up in a brick. A warning should be added to all asus filogic units in the wiki.
24 hours later on OEM, my unit is still randomly bootlooping and now also putting out coil whine. I filed an RMA. This unit was from Amazon USA in case anyone else is having issues. My Asus.com store USA units all work fine.
Hi folks. Sorry if this was asked before but I have both AX4000 and AX6000 and I can not set any 5G wifi using 160 Hz. My country is Canada and it seems to disable my 5G SSID. I think this may be a known bug but just wanted to know if this is something that doesn't work at all
help needed and thanks in advance!
sysupgrade crashed and failed on master branch build. same crash reported months ago.
studied sysupgrade scripts, itâs failed on exec /bin/busybox ash -c "$COMMAND" of /lib/upgrade/stage2
sysupgrade in the initramfs mode by serial console tufts, is no problem and ok. I don't know what is the difference and need your kindly help. or, if there is any workaround to do sysupgrade instead of serial console tftp?
Thu Dec 25 03:59:15 UTC 2025 upgrade: Sending KILL to remaining processes ...
[ 225.897027] stage2 (3922): drop_caches: 3
Thu Dec 25 03:59:21 UTC 2025 upgrade: Switching to ramdisk...
[ 227.040998] UBIFS (ubi0:7): background thread "ubifs_bgt0_7" stops
[ 227.051553] Unable to handle kernel access to user memory outside uaccess routines at virtual address 0000000000000070<1>[66234.845280] Mem abort info: <1>[66234.848085] ESR = 0x0000000096000005 <1>[66234.852069] EC = 0x25: DABT (current EL), IL = 32 bits <1>[66234.857479] SET = 0, FnV = 0 <1>[66234.860525] EA = 0, S1PTW = 0 <1>[66234.863655] FSC = 0x05: level 1 translation fault <1>[66234.868534] Data abort info: <1>[66234.871404] ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000 <1>[66234.876929] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 <1>[66234.881998] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 <1>[66234.887312] user pgtable: 4k pages, 39-bit VAs, pgdp=0000000045ef4000 <1>[66234.893740] [0000000000000070] pgd=0800000046760003, p4d=0800000046760003, pud=0800000046760003, pmd=0000000000000000 <0>[66234.904348] Internal error: Oops: 0000000096000005 [#1] SMP <7>[66234.909909] Modules linked in: pppoe ppp_async l2tp_ppp wireguard pptp pppox ppp_mppe ppp_generic nft_fib_inet mt7915e(O) mt76_connac_lib(O) mt76(O) mac80211(O) libchacha20poly1305 ipt_REJECT chacha_neon cfg80211(O) xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_helper xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment xt_TCPMSS xt_REDIRECT xt_MASQUERADE xt_LOG xt_HL xt_DSCP xt_DNETMAP(O) xt_DHCPMAC(O) xt_CT xt_CLASSIFY xfrm_interface ts_fsm ts_bm tcp_scalable tcp_bbr slhc sch_cake poly1305_neon nft_tproxy nft_socket nft_reject_ipv6 nft_reject_ipv4 nft_reject_inet nft_reject_bridge nft_reject nft_redir nft_quota nft_queue nft_numgen nft_nat nft_meta_bridge nft_masq nft_log nft_limit nft_hash nft_fwd_netdev nft_fib_ipv6 nft_fib_ipv4 nft_fib nft_dup_netdev nft_ct nft_compat nft_chain_nat nfnetlink_queue nf_tproxy_ipv6 nf_tproxy_ipv4 nf_tables nf_socket_ipv6 nf_socket_ipv4 nf_reject_ipv4 nf_nat_tftp nf_nat_snmp_basic <7>[66234.910154] nf_nat_sip nf_nat_rtsp(O) nf_nat_pptp nf_nat_irc nf_nat_h323 nf_nat_ftp nf_nat_amanda nf_log_syslog nf_dup_netdev nf_conntrack_tftp nf_conntrack_snmp nf_conntrack_sip nf_conntrack_sane nf_conntrack_rtsp(O) nf_conntrack_pptp nf_conntrack_netlink nf_conntrack_netbios_ns nf_conntrack_irc nf_conntrack_h323 nf_conntrack_ftp nf_conntrack_broadcast nf_conntrack_bridge ts_kmp nf_conntrack_amanda nf_conncount macvlan libcurve25519_generic libcrc32c libchacha ipvlan iptable_nat iptable_mangle iptable_filter ipt_ECN ip_tables compat_xtables(O) compat(O) br_netfilter asn1_decoder natflow(O) natcap(O) nf_nat nf_conntrack crypto_safexcel sch_tbf sch_ingress sch_htb sch_hfsc em_u32 cls_u32 cls_route cls_matchall cls_fw cls_flow cls_basic act_skbedit act_mirred act_gact i2c_gpio i2c_algo_bit cryptodev(O) xt_set ip_set_list_set ip_set_hash_netportnet ip_set_hash_netport ip_set_hash_netnet ip_set_hash_netiface ip_set_hash_net ip_set_hash_mac ip_set_hash_ipportnet ip_set_hash_ipportip ip_set_hash_ipport ip_set_hash_ipmark <7>[66235.000035] ip_set_hash_ipmac ip_set_hash_ip ip_set_bitmap_port ip_set_bitmap_ipmac ip_set_bitmap_ip ip_set nfnetlink jool_siit(O) jool(O) nf_defrag_ipv4 jool_common(O) ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 bonding tls ip6_gre ip_gre gre nat46(O) nf_defrag_ipv6 ip6_vti ip_vti sit l2tp_netlink l2tp_core udp_tunnel ip6_udp_tunnel ipcomp6 xfrm6_tunnel esp6 ah6 xfrm4_tunnel ipcomp esp4 ah4 ip6_tunnel tunnel6 tunnel4 ip_tunnel udp_diag tcp_diag raw_diag inet_diag tun xfrm_user xfrm_ipcomp af_key xfrm_algo autofs4 nls_utf8 nls_iso8859_1 crypto_user algif_skcipher algif_rng algif_hash algif_aead af_alg sha512_arm64 sha1_ce sha1_generic seqiv md5 echainiv geniv des_generic libdes cbc authencesn authenc arc4 leds_gpio gpio_button_hotplug(O) usbcore usb_common aquantia crc_itu_t <7>[66235.161750] CPU: 1 UID: 0 PID: 10737 Comm: busybox Tainted: G O 6.12.40 #0 <7>[66235.170002] Tainted: [O]=OOT_MODULE <7>[66235.173477] Hardware name: ASUS TUF-AX6000 (DT) <7>[66235.178776] pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) <7>[66235.185725] pc : percpu_counter_add_batch+0x14/0x104 <7>[66235.190687] lr : folio_account_cleaned+0x9c/0xc0 <7>[66235.195297] sp : ffffffc082fe38e0 <7>[66235.198599] x29: ffffffc082fe38e0 x28: 0000000000000000 x27: ffffffffffffffff <7>[66235.205726] x26: 0000000000000000 x25: fffffffffffffffe x24: ffffffc082fe39f0 <7>[66235.212853] x23: ffffffffffffffff x22: 0000000000000000 x21: 0000000000000000 <7>[66235.219980] x20: 0000000000000060 x19: ffffffffffffffff x18: 0000000000000014 <7>[66235.227107] x17: 0000000000000000 x16: 0000000000000001 x15: ffffff8009764a70 <7>[66235.234234] x14: 0000000000000000 x13: ffffff8000402e48 x12: 0000000000000000 <7>[66235.241361] x11: ffffffc080c55d1a x10: 0000000000000000 x9 : 0000000000000000 <7>[66235.248487] x8 : ffffffc080c55d16 x7 : 0000000000000000 x6 : ffffff800ff44d16 <7>[66235.255614] x5 : ffffffffffffffff x4 : 000000000000001e x3 : 0000000000000002 <7>[66235.262741] x2 : 0000000000000010 x1 : ffffffffffffffff x0 : 0000000000000060 <7>[66235.269867] Call trace: <7>[66235.272302] percpu_counter_add_batch+0x14/0x104 <7>[66235.276913] folio_account_cleaned+0x9c/0xc0 <7>[66235.281174] __folio_cancel_dirty+0xa8/0x100 <7>[66235.285435] truncate_cleanup_folio+0xe8/0xec <7>[66235.289784] truncate_inode_pages_range+0xc4/0x380 <7>[66235.294567] truncate_inode_pages_final+0x78/0x98 <7>[66235.299263] evict+0x250/0x294 <7>[66235.302312] dispose_list+0x5c/0x88 <7>[66235.305793] evict_inodes+0x14c/0x1a4 <7>[66235.309448] generic_shutdown_super+0x44/0x160 <7>[66235.313885] kill_block_super+0x18/0x38 <7>[66235.317713] deactivate_locked_super+0x4c/0xf8 <7>[66235.322145] deactivate_super+0x68/0x7c <7>[66235.325970] cleanup_mnt+0x98/0x128 <7>[66235.329450] __cleanup_mnt+0x10/0x18 <7>[66235.333017] task_work_run+0x9c/0xe0 <7>[66235.336584] do_notify_resume+0xf4/0x100 <7>[66235.340499] el0_svc+0x44/0x60 <7>[66235.343546] el0t_64_sync_handler+0x118/0x124 <7>[66235.347894] el0t_64_sync+0x150/0x154 <0>[66235.351550] Code: 910003fd a90153f3 aa0003f4 aa0103f3 (f9400800) <4>[66235.357630] ---[ end trace 0000000000000000 ]---
10 out of 10 stars for RMA. No mention of openwrt after flashing OEM; however, my unit was very broken so they may not have attempted any repair. Asus has no stock and for some reason a $400 broadcom ROG unit was the replacement. Was able to choose BT8 instead.
Still no clue on what went wrong. Continuously low uptime is the only real warning sign.
A little update on my device. A week ago (no configuration changes, nothing changed in network) all my gaming PCs went into losing 20-25% packets in CS2. Both were wired to 1Gb switch ports. Packet losses were reported only in download path. Switching them to external unmanaged switch connected to 2.5Gb LAN port make them behave normal again. I tried to replicate packet loss using iperf3 to a VPS box and there was no packet loss reported with the tool, so, I assume that it was not packet loss, but rather packet corruption reported as packet loss, because the game was not able to decrypt/verify packets. What is really odd is that it just happened one day after long period of the setup being stable. I did update to 24.10.5 from 24.10.4 while trying to mitigate the issue - didnât make any difference. For now I will just not use 1 Gb ports.