Crashes when Wifi 5GHz enabled

Hello everyone,

Since I started to use openWrt, I have an issue with wifi. If I enable the 5GHz band, the router crashes randomly. Almost all LED switch off, and it's not possible to access the router anymore.
I need to hard reset the router to start using again.

I'm now on openwrt 24.10 but had the same issue on openwrt 23.10. I checked on forum and sometimes people said its can be a driver issue with the wifi card but I cannot find a solution.
The router is an Asus RT-AX53U.

Should be 24.10.5 unless you know better.

Please connect to your OpenWrt device using ssh and copy the output of the following commands and post it here using the "Preformatted text </> " button (red circle; this works best in the 'Markdown' composer view in the blue oval):

Screenshot 2025-10-20 at 8.14.14 PM

Remember to redact passwords, VPN keys, MAC addresses and any public IP addresses you may have:

ubus call system board
cat /etc/config/network
cat /etc/config/wireless
cat /etc/config/dhcp
cat /etc/config/firewall

My exact actual version is 24.10.2
Here is what you asked. Wifi 5GHz is disabled.

root@OpenWrt:~# ubus call system board
{
	"kernel": "6.6.93",
	"hostname": "OpenWrt",
	"system": "MediaTek MT7621 ver:1 eco:4",
	"model": "ASUS RT-AX53U",
	"board_name": "asus,rt-ax53u",
	"rootfs_type": "squashfs",
	"release": {
		"distribution": "OpenWrt",
		"version": "24.10.2",
		"revision": "r28739-d9340319c6",
		"target": "ramips/mt7621",
		"description": "OpenWrt 24.10.2 r28739-d9340319c6",
		"builddate": "1750711236"
	}
}

root@OpenWrt:~# cat /etc/config/network

config interface 'loopback'
	option device 'lo'
	option proto 'static'
	option ipaddr '127.0.0.1'
	option netmask '255.0.0.0'

config globals 'globals'
	option ula_prefix 'fd2a:xxxx:xxxx::/48'
	option packet_steering '1'

config device
	option name 'br-lan'
	option type 'bridge'
	list ports 'lan1'
	list ports 'lan2'
	list ports 'lan3'

config interface 'lan'
	option device 'br-lan'
	option proto 'static'
	option ipaddr '192.168.50.1'
	option netmask '255.255.255.0'
	option ip6assign '60'

config interface 'wan'
	option device 'wan'
	option proto 'dhcp'
	option vendorid 'neufbox_NB6V-B49DXXXXXX'
	option peerdns '0'
	list dns '1.1.1.1'

config interface 'wan6'
	option device 'wan'
	option proto 'dhcpv6'
	option vendorclass '0000a00c00416E65xxxxxxxxxxxxxxxx'
	option clientid '00030001B49xxxxxxxxxxxx'
	option defaultreqopts '0'
	option reqopts '23 25 26'
	option reqaddress 'try'
	option reqprefix 'auto'
	option noclientfqdn '1'
	option noacceptreconfig '1'

config interface 'ONT_SFR'
	option proto 'static'
	option device 'wan'
	option ipaddr '192.168.4.1'
	option netmask '255.255.255.0'

root@OpenWrt:~# cat /etc/config/wireless

config wifi-device 'radio0'
	option type 'mac80211'
	option path '1e140000.pcie/pci0000:00/0000:00:01.0/0000:02:00.0'
	option channel '1'
	option band '2g'
	option htmode 'HE20'
	option country 'FR'
	option cell_density '0'

config wifi-iface 'default_radio0'
	option device 'radio0'
	option network 'lan'
	option mode 'ap'
	option ssid 'La Fustiere'
	option encryption 'sae-mixed'
	option key 'LqU3xxxxxxxxxxx'

config wifi-device 'radio1'
	option type 'mac80211'
	option path '1e140000.pcie/pci0000:00/0000:00:01.0/0000:02:00.0+1'
	option channel '36'
	option band '5g'
	option htmode 'HE80'
	option cell_density '0'
	option country 'FR'
	option disabled '1'

config wifi-iface 'default_radio1'
	option device 'radio1'
	option network 'lan'
	option mode 'ap'
	option ssid 'La Fustiere'
	option encryption 'sae-mixed'
	option key 'LqUxxxxxxxxxxxxxxx'
	option disabled '1'

root@OpenWrt:~# cat /etc/config/dhcp

config dnsmasq
	option domainneeded '1'
	option localise_queries '1'
	option rebind_protection '1'
	option rebind_localhost '1'
	option local '/lan/'
	option domain 'lan'
	option expandhosts '1'
	option cachesize '1000'
	option authoritative '1'
	option readethers '1'
	option leasefile '/tmp/dhcp.leases'
	option resolvfile '/tmp/resolv.conf.d/resolv.conf.auto'
	option localservice '1'
	option ednspacket_max '1232'

config dhcp 'lan'
	option interface 'lan'
	option start '100'
	option limit '150'
	option leasetime '12h'
	option dhcpv4 'server'
	option dhcpv6 'server'
	option ra 'server'
	list ra_flags 'managed-config'
	list ra_flags 'other-config'

config dhcp 'wan'
	option interface 'wan'
	option ignore '1'

config odhcpd 'odhcpd'
	option maindhcp '0'
	option leasefile '/tmp/hosts/odhcpd'
	option leasetrigger '/usr/sbin/odhcpd-update'
	option loglevel '4'

config host
	option name 'NAS-Fustiere'
	list mac '90:09:D0:XX:XX:XX'
	option ip '192.168.50.60'

config host
	option name 'Shelly-chauffage'
	list mac '44:17:93:XX:XX:XX'
	option ip '192.168.50.71'

config host
	option name 'Shelly-chauffeEau'
	list mac 'A8:03:2A:XX:XX:XX'
	option ip '192.168.50.72'

config host
	option name 'Linky-Routeur'
	list mac '48:E7:29:XX:XX:XX'
	option ip '192.168.50.70'

root@OpenWrt:~# cat /etc/config/firewall

config defaults
	option syn_flood '1'
	option input 'REJECT'
	option output 'ACCEPT'
	option forward 'REJECT'

config zone
	option name 'lan'
	option input 'ACCEPT'
	option output 'ACCEPT'
	option forward 'ACCEPT'
	list network 'lan'

config zone
	option name 'wan'
	option input 'REJECT'
	option output 'ACCEPT'
	option forward 'REJECT'
	option masq '1'
	option mtu_fix '1'
	list network 'wan'
	list network 'wan6'
	list network 'ONT_SFR'

config forwarding
	option src 'lan'
	option dest 'wan'

config rule
	option name 'Allow-DHCP-Renew'
	option src 'wan'
	option proto 'udp'
	option dest_port '68'
	option target 'ACCEPT'
	option family 'ipv4'

config rule
	option name 'Allow-Ping'
	option src 'wan'
	option proto 'icmp'
	option icmp_type 'echo-request'
	option family 'ipv4'
	option target 'ACCEPT'

config rule
	option name 'Allow-IGMP'
	option src 'wan'
	option proto 'igmp'
	option family 'ipv4'
	option target 'ACCEPT'

config rule
	option name 'Allow-DHCPv6'
	option src 'wan'
	option proto 'udp'
	option dest_port '546'
	option family 'ipv6'
	option target 'ACCEPT'

config rule
	option name 'Allow-MLD'
	option src 'wan'
	option proto 'icmp'
	option src_ip 'fe80::/10'
	list icmp_type '130/0'
	list icmp_type '131/0'
	list icmp_type '132/0'
	list icmp_type '143/0'
	option family 'ipv6'
	option target 'ACCEPT'

config rule
	option name 'Allow-ICMPv6-Input'
	option src 'wan'
	option proto 'icmp'
	list icmp_type 'echo-request'
	list icmp_type 'echo-reply'
	list icmp_type 'destination-unreachable'
	list icmp_type 'packet-too-big'
	list icmp_type 'time-exceeded'
	list icmp_type 'bad-header'
	list icmp_type 'unknown-header-type'
	list icmp_type 'router-solicitation'
	list icmp_type 'neighbour-solicitation'
	list icmp_type 'router-advertisement'
	list icmp_type 'neighbour-advertisement'
	option limit '1000/sec'
	option family 'ipv6'
	option target 'ACCEPT'
	option enabled '0'

config rule
	option name 'Allow-ICMPv6-Forward'
	option src 'wan'
	option dest '*'
	option proto 'icmp'
	list icmp_type 'echo-request'
	list icmp_type 'echo-reply'
	list icmp_type 'destination-unreachable'
	list icmp_type 'packet-too-big'
	list icmp_type 'time-exceeded'
	list icmp_type 'bad-header'
	list icmp_type 'unknown-header-type'
	option limit '1000/sec'
	option family 'ipv6'
	option target 'ACCEPT'
	option enabled '0'

config rule
	option name 'Allow-IPSec-ESP'
	option src 'wan'
	option dest 'lan'
	option proto 'esp'
	option target 'ACCEPT'

config rule
	option name 'Allow-ISAKMP'
	option src 'wan'
	option dest 'lan'
	option dest_port '500'
	option proto 'udp'
	option target 'ACCEPT'

config redirect
	option dest 'lan'
	option target 'DNAT'
	option name 'HTTP'
	option src 'wan'
	option src_dport '80'
	option dest_ip '192.168.50.60'

config redirect
	option dest 'lan'
	option target 'DNAT'
	option name 'HTTPS'
	option src 'wan'
	option src_dport '443'
	option dest_ip '192.168.50.60'

config redirect
	option dest 'lan'
	option target 'DNAT'
	option name 'Drive'
	option src 'wan'
	option src_dport '6690'
	option dest_ip '192.168.50.60'

config rule
	option name 'HTTP IPv6'
	option src 'wan'
	option src_port '80'
	option dest_port '80'
	option target 'ACCEPT'
	option dest 'lan'
	list dest_ip '192.168.50.60'

config rule
	option name 'HTTPS IPv6'
	option src 'wan'
	option dest_port '443'
	option target 'ACCEPT'
	option dest 'lan'
	list dest_ip '192.168.50.60'

config rule
	option name 'Drive'
	option src 'wan'
	option src_port '6690'
	list dest_ip '2a02:8429:xxxx:xxxx::a69'
	option dest_port '6690'
	option target 'ACCEPT'
	option enabled '0'

Moreover to say that I was with a different ISP before (so a different configuration) and have the same wifi issue

Check mac addresses for conflicts
EA8500 had a mac confict between wan port and radio

Can you give me more information please ? What exctly do I need to check with MAC address ?

This one does not, but one can set MAC to random and never see those....

Edit 2.4 wifi access point - go to lower part - advanced, about end of 1st page ypu can select random MAC, repeat with 5GHz and try to enable it.

There is nothing "scary" in your config that should warrant a crash. As I see you emulate old router on WAN port?

1 Like

You should sysupgrade to the newest 24.10 series release (or to the newest 25.12 release candidate). It makes no sense to try to debug a problem that is possibly already fixed in newer releases.

Not sure the problem will be solved in the new 24.10.5 as it was already here in 23.x and still here in 24.10.2

I had same device up to 24.10.3 and it never had any problems whatsoever..... Now back to OEM it serves a friend of mine....

Install owut and keep it upgraded, even though I dont think it is a problem at this point.

OK. I forgot to say I'm using LuCi.

luci

OK, it is luci-app-attendedsysupgrade then

Just tell us how it goes -> upgrade to 24.10.5 -> try to enable 5GHz (wait 10min for AP to appear)

OK, just done it. Then crashed 2min after (only LAN LED on, even Power LED is off)

You speak about "vendor id" ?

OK, connect a PC to the LAN port. ssh and in the console run logread -f and start 5GHz. This will show some logs before the crash

Yep, if you did it knowingly there is no problem....

Log from before activating 5GHz to now (not already crashed for now). Hope I don't share sensitive data as I don't really understand what's in log for now

root@OpenWrt:~# logread -f
Fri Feb  6 21:00:42 2026 daemon.notice netifd: radio1 (4107): WARNING: Variable 'data' does not exist or is not an array/object
Fri Feb  6 21:00:42 2026 daemon.notice hostapd: Set new config for phy phy1:
Fri Feb  6 21:00:42 2026 daemon.notice wpa_supplicant[1603]: Set new config for phy phy1
Fri Feb  6 21:00:43 2026 daemon.notice wpa_supplicant[1603]: Set new config for phy phy1
Fri Feb  6 21:00:43 2026 daemon.notice hostapd: Set new config for phy phy1: /var/run/hostapd-phy1.conf
Fri Feb  6 21:00:43 2026 daemon.notice hostapd: Restart interface for phy phy1
Fri Feb  6 21:00:43 2026 daemon.notice hostapd: Configuration file: data: driver=nl80211 logger_syslog=127 logger_syslog_level=2 logger_stdout=127 logger_stdout_level=2 country_code=FR ieee80211d=1 ieee80211h=1 hw_mode=a beacon_int=100 stationary_ap=1 chanlist=36 tx_queue_data2_burst=2.0 #num_global_macaddr=1 #macaddr_base= ieee80211n=1 ht_coex=0 ht_capab=[HT40+][LDPC][SHORT-GI-20][SHORT-GI-40][TX-STBC][RX-STBC1][MAX-AMSDU-7935] ieee80211ac=1 vht_oper_chwidth=1 vht_oper_centr_freq_seg0_idx=42 vht_capab=[RXLDPC][SHORT-GI-80][TX-STBC-2BY1][SU-BEAMFORMER][SU-BEAMFORMEE][MU-BEAMFORMER][MU-BEAMFORMEE][RX-ANTENNA-PATTERN][TX-ANTENNA-PATTERN][RX-STBC-1][SOUNDING-DIMENSION-2][BF-ANTENNA-2][MAX-MPDU-7991][MAX-A-MPDU-LEN-EXP7] ieee80211ax=1 he_oper_chwidth=1 he_oper_centr_freq_seg0_idx=42 he_su_beamformer=1 he_su_beamformee=1 he_mu_beamformer=1 he_bss_color=128 he_spr_sr_control=3 he_default_pe_duration=4 he_rts_threshold=1023 he_mu_edca_qos_info_param_count=0 he_mu_edca_qos_info_q_ack=0 he_mu_edca_qos_info_queue_request=0 he_mu_edca_qo
Fri Feb  6 21:00:43 2026 kern.info kernel: [  146.111819] br-lan: port 5(phy1-ap0) entered blocking state
Fri Feb  6 21:00:43 2026 kern.info kernel: [  146.117607] br-lan: port 5(phy1-ap0) entered disabled state
Fri Feb  6 21:00:43 2026 kern.info kernel: [  146.123323] mt7915e 0000:02:00.0 phy1-ap0: entered allmulticast mode
Fri Feb  6 21:00:43 2026 kern.info kernel: [  146.130576] mt7915e 0000:02:00.0 phy1-ap0: entered promiscuous mode
Fri Feb  6 21:00:43 2026 kern.info kernel: [  146.137703] br-lan: port 5(phy1-ap0) entered blocking state
Fri Feb  6 21:00:43 2026 kern.info kernel: [  146.143358] br-lan: port 5(phy1-ap0) entered forwarding state
Fri Feb  6 21:00:43 2026 kern.info kernel: [  146.149737] br-lan: port 5(phy1-ap0) entered disabled state
Fri Feb  6 21:00:43 2026 daemon.notice hostapd: phy1-ap0: interface state UNINITIALIZED->COUNTRY_UPDATE
Fri Feb  6 21:00:43 2026 daemon.notice hostapd: phy1-ap0: interface state COUNTRY_UPDATE->HT_SCAN
Fri Feb  6 21:00:43 2026 daemon.notice netifd: Wireless device 'radio1' is now up
Fri Feb  6 21:00:44 2026 daemon.notice netifd: Network device 'phy1-ap0' link is up
Fri Feb  6 21:00:44 2026 kern.info kernel: [  146.569826] br-lan: port 5(phy1-ap0) entered blocking state
Fri Feb  6 21:00:44 2026 kern.info kernel: [  146.575499] br-lan: port 5(phy1-ap0) entered forwarding state
Fri Feb  6 21:00:44 2026 daemon.notice hostapd: phy1-ap0: interface state HT_SCAN->ENABLED
Fri Feb  6 21:00:44 2026 daemon.notice hostapd: phy1-ap0: AP-ENABLED
Fri Feb  6 21:00:45 2026 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
Fri Feb  6 21:00:45 2026 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 4 names
Fri Feb  6 21:00:45 2026 daemon.info dnsmasq[1]: read /tmp/hosts/odhcpd - 12 names
Fri Feb  6 21:00:45 2026 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
Fri Feb  6 21:01:28 2026 daemon.notice hostapd: phy0-ap0: STA 3e:f0:e2:47:XX:XX IEEE 802.11: did not acknowledge authentication response
Fri Feb  6 21:01:33 2026 daemon.info hostapd: phy1-ap0: STA 3e:f0:e2:47:XX:XX IEEE 802.11: associated (aid 1)
Fri Feb  6 21:01:33 2026 daemon.notice hostapd: phy0-ap0: Prune association for 3e:f0:e2:47:XX:XX
Fri Feb  6 21:01:33 2026 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED 3e:f0:e2:47:XX:XX auth_alg=sae
Fri Feb  6 21:01:33 2026 daemon.info hostapd: phy1-ap0: STA 3e:f0:e2:47:XX:XX WPA: pairwise key handshake completed (RSN)
Fri Feb  6 21:01:33 2026 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED 3e:f0:e2:47:XX:XX
Fri Feb  6 21:01:37 2026 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) 3e:f0:e2:47:XX:XX
Fri Feb  6 21:01:37 2026 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.50.120 3e:f0:e2:47:XX:XX
Fri Feb  6 21:01:37 2026 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) 3e:f0:e2:47:XX:XX
Fri Feb  6 21:01:37 2026 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.50.120 3e:f0:e2:47:XX:XX
Fri Feb  6 21:01:37 2026 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) 3e:f0:e2:47:XX:XX
Fri Feb  6 21:01:37 2026 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.50.120 3e:f0:e2:47:XX:XX
Fri Feb  6 21:01:37 2026 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.50.120 3e:f0:e2:47:XX:XX
Fri Feb  6 21:01:37 2026 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.50.120 3e:f0:e2:47:XX:XX Galaxy-A14
Fri Feb  6 21:02:03 2026 daemon.info hostapd: phy0-ap0: STA 3e:f0:e2:47:XX:XX IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

All is in order, you can edit away last 3 pieces of client MAC addresses.

It shows one client roamed from 2.4 to 5GHz - I think you are all set now.

You can add

        option background_radar '1'

to 5GHz radio section and use automatic channel selection - the device supports background radar detection and escapes radar instantly.

I upgraded to 24.10.5 as recommended

I don't understand what you mean

Already connected duccessfully in the past, and still had crashes

I don't have many Wifi networks in the area, do you think it's still usefull ?

1 Like