IPv6 / DHCPv6 loses connection due to Gateway fe80::1

I have a problem with my IPv6 connection, after a router reboot it changes the Gateway to fe80::1 and the connection is lost. After I do a service restart then it obtains the correct Gateway and the connection works. Then after a few minutes it changes back to fe80::1 and the connection is lost again.
How can I solve this problem?

GL.iNet GL-MT6000
OpenWrt 24.10.2

post the relevant sequesce from logread command output.

post content of /etc/config/firewall and /etc/config/network files, use the </> button when you paste the info.

logread

Tue Jul 15 15:06:39 2025 daemon.notice netifd: Interface 'wan6' is now down
Tue Jul 15 15:06:39 2025 daemon.notice netifd: Interface 'wan6' is setting up now
Tue Jul 15 15:06:39 2025 daemon.info avahi-daemon[2288]: Withdrawing address record for 2a00:a041:e700:3::3bfb:b55f on eth1.
Tue Jul 15 15:06:39 2025 daemon.info avahi-daemon[2288]: Leaving mDNS multicast group on interface eth1.IPv6 with address 2a00:a041:e700:3::3bfb:b55f.
Tue Jul 15 15:06:39 2025 daemon.info avahi-daemon[2288]: Joining mDNS multicast group on interface eth1.IPv6 with address fe80::9683:c4ff:fea3:fa8b.
Tue Jul 15 15:06:39 2025 daemon.info avahi-daemon[2288]: Registering new address record for fe80::9683:c4ff:fea3:fa8b on eth1.*.
Tue Jul 15 15:06:39 2025 daemon.info avahi-daemon[2288]: Withdrawing address record for 2a00:a041:e118:b100::1 on br-lan.
Tue Jul 15 15:06:39 2025 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
Tue Jul 15 15:06:39 2025 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 4 names
Tue Jul 15 15:06:39 2025 daemon.info dnsmasq[1]: read /tmp/hosts/odhcpd - 2 names
Tue Jul 15 15:06:39 2025 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
Tue Jul 15 15:06:40 2025 daemon.warn odhcpd[2057]: No default route present, overriding ra_lifetime to 0!
Tue Jul 15 15:06:42 2025 daemon.warn odhcpd[2057]: No default route present, overriding ra_lifetime to 0!
Tue Jul 15 15:06:45 2025 daemon.info avahi-daemon[2288]: Leaving mDNS multicast group on interface eth1.IPv6 with address fe80::9683:c4ff:fea3:fa8b.
Tue Jul 15 15:06:45 2025 daemon.info avahi-daemon[2288]: Joining mDNS multicast group on interface eth1.IPv6 with address 2a00:a041:e700:3::3bfb:b55f.
Tue Jul 15 15:06:45 2025 daemon.info avahi-daemon[2288]: Registering new address record for 2a00:a041:e700:3::3bfb:b55f on eth1.*.
Tue Jul 15 15:06:45 2025 daemon.info avahi-daemon[2288]: Withdrawing address record for fe80::9683:c4ff:fea3:fa8b on eth1.
Tue Jul 15 15:06:45 2025 daemon.info avahi-daemon[2288]: Registering new address record for 2a00:a041:e118:b100::1 on br-lan.*.
Tue Jul 15 15:06:45 2025 daemon.notice netifd: Interface 'wan6' is now up
Tue Jul 15 15:06:45 2025 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
Tue Jul 15 15:06:45 2025 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 4 names
Tue Jul 15 15:06:45 2025 daemon.info dnsmasq[1]: read /tmp/hosts/odhcpd - 4 names
Tue Jul 15 15:06:45 2025 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
Tue Jul 15 15:06:45 2025 user.notice firewall: Reloading firewall due to ifup of wan6 (eth1)
Tue Jul 15 15:08:25 2025 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) 68:39:43:65:5b:2a
Tue Jul 15 15:08:25 2025 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.1.30 68:39:43:65:5b:2a
Tue Jul 15 15:10:00 2025 cron.err crond[2116]: user root: process already running: pgrep -x ffmpeg || ffmpeg -rtsp_transport tcp -i rtsp://admin:123456789@192.168.1.30/h264Preview_01_main -c copy -map 0 -f segment -segment_time 300 -segment_format mp4 -segment_atclocktime 1 -reset_timestamps 1 -strftime 1 /mnt/sda1/%Y%m%d/Backyard-%H%M%S.mp4
Tue Jul 15 15:13:26 2025 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) 68:39:43:65:5b:2a
Tue Jul 15 15:13:26 2025 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.1.30 68:39:43:65:5b:2a
Tue Jul 15 15:14:32 2025 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: dns.msftncsi.com
Tue Jul 15 15:15:00 2025 cron.err crond[2116]: USER root pid 6016 cmd pgrep -x ffmpeg || ffmpeg -rtsp_transport tcp -i rtsp://admin:123456789@192.168.1.30/h264Preview_01_main -c copy -map 0 -f segment -segment_time 300 -segment_format mp4 -segment_atclocktime 1 -reset_timestamps 1 -strftime 1 /mnt/sda1/%Y%m%d/Backyard-%H%M%S.mp4
Tue Jul 15 15:15:59 2025 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED 12:e9:08:d6:35:57
Tue Jul 15 15:16:03 2025 daemon.info hostapd: phy1-ap0: STA 12:e9:08:d6:35:57 IEEE 802.11: associated (aid 3)
Tue Jul 15 15:16:03 2025 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED 12:e9:08:d6:35:57 auth_alg=sae
Tue Jul 15 15:16:03 2025 daemon.info hostapd: phy1-ap0: STA 12:e9:08:d6:35:57 WPA: pairwise key handshake completed (RSN)
Tue Jul 15 15:16:03 2025 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED 12:e9:08:d6:35:57
Tue Jul 15 15:16:03 2025 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.151 12:e9:08:d6:35:57
Tue Jul 15 15:16:03 2025 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.151 12:e9:08:d6:35:57 Galaxy-S24
Tue Jul 15 15:16:53 2025 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED 72:85:6b:ee:90:39
Tue Jul 15 15:17:03 2025 daemon.info hostapd: phy1-ap0: STA 72:85:6b:ee:90:39 IEEE 802.11: authenticated
Tue Jul 15 15:17:03 2025 daemon.info hostapd: phy1-ap0: STA 72:85:6b:ee:90:39 IEEE 802.11: associated (aid 1)
Tue Jul 15 15:17:03 2025 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED 72:85:6b:ee:90:39 auth_alg=open
Tue Jul 15 15:17:03 2025 daemon.info hostapd: phy1-ap0: STA 72:85:6b:ee:90:39 WPA: pairwise key handshake completed (RSN)
Tue Jul 15 15:17:03 2025 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED 72:85:6b:ee:90:39
Tue Jul 15 15:17:04 2025 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.227 72:85:6b:ee:90:39
Tue Jul 15 15:17:04 2025 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.227 72:85:6b:ee:90:39 h-Edna-sl-Galaxy-A71
Tue Jul 15 15:17:17 2025 daemon.info hostapd: phy0-ap0: STA 1e:0f:e2:0f:7d:10 IEEE 802.11: associated (aid 6)
Tue Jul 15 15:17:17 2025 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 1e:0f:e2:0f:7d:10 auth_alg=sae
Tue Jul 15 15:17:17 2025 daemon.info hostapd: phy0-ap0: STA 1e:0f:e2:0f:7d:10 WPA: pairwise key handshake completed (RSN)
Tue Jul 15 15:17:17 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 1e:0f:e2:0f:7d:10
Tue Jul 15 15:17:17 2025 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.143 1e:0f:e2:0f:7d:10
Tue Jul 15 15:17:17 2025 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.143 1e:0f:e2:0f:7d:10 Mi-Note-10-Lite
Tue Jul 15 15:18:26 2025 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) 68:39:43:65:5b:2a
Tue Jul 15 15:18:26 2025 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.1.30 68:39:43:65:5b:2a
Tue Jul 15 15:20:00 2025 cron.err crond[2116]: USER root pid 6142 cmd pgrep -x ffmpeg || ffmpeg -rtsp_transport tcp -i rtsp://admin:123456789@192.168.1.30/h264Preview_01_main -c copy -map 0 -f segment -segment_time 300 -segment_format mp4 -segment_atclocktime 1 -reset_timestamps 1 -strftime 1 /mnt/sda1/%Y%m%d/Backyard-%H%M%S.mp4
Tue Jul 15 15:20:32 2025 daemon.notice netifd: wan (3511): udhcpc: sending renew to server 172.18.178.211
Tue Jul 15 15:20:33 2025 daemon.notice netifd: wan (3511): udhcpc: lease of 100.120.222.34 obtained from 172.18.178.211, lease time 1800
Tue Jul 15 15:21:02 2025 daemon.notice netifd: Interface 'wan6' is now down
Tue Jul 15 15:21:02 2025 daemon.info avahi-daemon[2288]: Withdrawing address record for 2a00:a041:e700:3::3bfb:b55f on eth1.
Tue Jul 15 15:21:02 2025 daemon.info avahi-daemon[2288]: Leaving mDNS multicast group on interface eth1.IPv6 with address 2a00:a041:e700:3::3bfb:b55f.
Tue Jul 15 15:21:02 2025 daemon.info avahi-daemon[2288]: Joining mDNS multicast group on interface eth1.IPv6 with address fe80::9683:c4ff:fea3:fa8b.
Tue Jul 15 15:21:02 2025 daemon.info avahi-daemon[2288]: Registering new address record for fe80::9683:c4ff:fea3:fa8b on eth1.*.
Tue Jul 15 15:21:02 2025 daemon.notice netifd: Interface 'wan6' is setting up now
Tue Jul 15 15:21:02 2025 daemon.info avahi-daemon[2288]: Withdrawing address record for 2a00:a041:e118:b100::1 on br-lan.
Tue Jul 15 15:21:02 2025 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
Tue Jul 15 15:21:02 2025 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 4 names
Tue Jul 15 15:21:02 2025 daemon.info dnsmasq[1]: read /tmp/hosts/odhcpd - 2 names
Tue Jul 15 15:21:02 2025 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
Tue Jul 15 15:21:03 2025 daemon.warn odhcpd[2057]: No default route present, overriding ra_lifetime to 0!
Tue Jul 15 15:21:17 2025 daemon.info avahi-daemon[2288]: Leaving mDNS multicast group on interface eth1.IPv6 with address fe80::9683:c4ff:fea3:fa8b.
Tue Jul 15 15:21:17 2025 daemon.info avahi-daemon[2288]: Joining mDNS multicast group on interface eth1.IPv6 with address 2a00:a041:e700:3::3bfb:b55f.
Tue Jul 15 15:21:17 2025 daemon.info avahi-daemon[2288]: Registering new address record for 2a00:a041:e700:3::3bfb:b55f on eth1.*.
Tue Jul 15 15:21:17 2025 daemon.info avahi-daemon[2288]: Withdrawing address record for fe80::9683:c4ff:fea3:fa8b on eth1.
Tue Jul 15 15:21:17 2025 daemon.info avahi-daemon[2288]: Registering new address record for 2a00:a041:e118:b100::1 on br-lan.*.
Tue Jul 15 15:21:17 2025 daemon.notice netifd: Interface 'wan6' is now up
Tue Jul 15 15:21:17 2025 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
Tue Jul 15 15:21:17 2025 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 4 names
Tue Jul 15 15:21:17 2025 daemon.info dnsmasq[1]: read /tmp/hosts/odhcpd - 4 names
Tue Jul 15 15:21:17 2025 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
Tue Jul 15 15:21:18 2025 user.notice firewall: Reloading firewall due to ifup of wan6 (eth1)
Tue Jul 15 15:23:27 2025 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) 68:39:43:65:5b:2a
Tue Jul 15 15:23:27 2025 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.1.30 68:39:43:65:5b:2a
Tue Jul 15 15:25:00 2025 cron.err crond[2116]: USER root pid 6570 cmd pgrep -x ffmpeg || ffmpeg -rtsp_transport tcp -i rtsp://admin:123456789@192.168.1.30/h264Preview_01_main -c copy -map 0 -f segment -segment_time 300 -segment_format mp4 -segment_atclocktime 1 -reset_timestamps 1 -strftime 1 /mnt/sda1/%Y%m%d/Backyard-%H%M%S.mp4
Tue Jul 15 15:28:28 2025 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) 68:39:43:65:5b:2a
Tue Jul 15 15:28:28 2025 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.1.30 68:39:43:65:5b:2a
Tue Jul 15 15:30:00 2025 cron.err crond[2116]: USER root pid 6739 cmd pgrep -x ffmpeg || ffmpeg -rtsp_transport tcp -i rtsp://admin:123456789@192.168.1.30/h264Preview_01_main -c copy -map 0 -f segment -segment_time 300 -segment_format mp4 -segment_atclocktime 1 -reset_timestamps 1 -strftime 1 /mnt/sda1/%Y%m%d/Backyard-%H%M%S.mp4
Tue Jul 15 15:31:14 2025 authpriv.info dropbear[6741]: Child connection from 192.168.1.242:4189
Tue Jul 15 15:31:15 2025 authpriv.info dropbear[6741]: Exit before auth from <192.168.1.242:4189>: Error reading: Connection reset by peer
Tue Jul 15 15:31:19 2025 authpriv.info dropbear[6742]: Child connection from 192.168.1.242:4190
Tue Jul 15 15:31:24 2025 authpriv.notice dropbear[6742]: Password auth succeeded for 'root' from 192.168.1.242:4190

/etc/config/firewall

config defaults
        option input 'REJECT'
        option output 'ACCEPT'
        option forward 'REJECT'
        option synflood_protect '1'
        option flow_offloading '1'
        option flow_offloading_hw '1'

config zone
        option name 'lan'
        list network 'lan'
        option input 'ACCEPT'
        option output 'ACCEPT'
        option forward 'ACCEPT'

config zone
        option name 'wan'
        list network 'wan'
        list network 'wan6'
        option input 'REJECT'
        option output 'ACCEPT'
        option forward 'REJECT'
        option masq '1'
        option mtu_fix '1'

config forwarding
        option src 'lan'
        option dest 'wan'

config rule
        option name 'Allow-DHCP-Renew'
        option src 'wan'
        option proto 'udp'
        option dest_port '68'
        option target 'ACCEPT'
        option family 'ipv4'

config rule
        option name 'Allow-Ping'
        option src 'wan'
        option proto 'icmp'
        option icmp_type 'echo-request'
        option family 'ipv4'
        option target 'ACCEPT'

config rule
        option name 'Allow-IGMP'
        option src 'wan'
        option proto 'igmp'
        option family 'ipv4'
        option target 'ACCEPT'

config rule
        option name 'Allow-DHCPv6'
        option src 'wan'
        option proto 'udp'
        option dest_port '546'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-MLD'
        option src 'wan'
        option proto 'icmp'
        option src_ip 'fe80::/10'
        list icmp_type '130/0'
        list icmp_type '131/0'
        list icmp_type '132/0'
        list icmp_type '143/0'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-ICMPv6-Input'
        option src 'wan'
        option proto 'icmp'
        list icmp_type 'echo-request'
        list icmp_type 'echo-reply'
        list icmp_type 'destination-unreachable'
        list icmp_type 'packet-too-big'
        list icmp_type 'time-exceeded'
        list icmp_type 'bad-header'
        list icmp_type 'unknown-header-type'
        list icmp_type 'router-solicitation'
        list icmp_type 'neighbour-solicitation'
        list icmp_type 'router-advertisement'
        list icmp_type 'neighbour-advertisement'
        option limit '1000/sec'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-ICMPv6-Forward'
        option src 'wan'
        option dest '*'
        option proto 'icmp'
        list icmp_type 'echo-request'
        list icmp_type 'echo-reply'
        list icmp_type 'destination-unreachable'
        list icmp_type 'packet-too-big'
        list icmp_type 'time-exceeded'
        list icmp_type 'bad-header'
        list icmp_type 'unknown-header-type'
        option limit '1000/sec'
        option family 'ipv6'
        option target 'ACCEPT'

config rule
        option name 'Allow-IPSec-ESP'
        option src 'wan'
        option dest 'lan'
        option proto 'esp'
        option target 'ACCEPT'

config rule
        option name 'Allow-ISAKMP'
        option src 'wan'
        option dest 'lan'
        option dest_port '500'
        option proto 'udp'
        option target 'ACCEPT'

config redirect 'dns_int'
        option name 'Intercept-DNS'
        option family 'any'
        option proto 'tcp udp'
        option src 'lan'
        option src_dport '53'
        option target 'DNAT'

config rule 'dot_fwd'
        option name 'Deny-DoT'
        option src 'lan'
        option dest 'wan'
        option dest_port '853'
        option proto 'tcp udp'
        option target 'REJECT'

config rule
        option name 'Deny access during the night'
        option src 'lan'
        option dest '*'
        option target 'REJECT'
        option start_time '01:00:00'
        option stop_time '07:00:00'
        list proto 'all'
        list src_mac '12:E9:08:D6:35:57'
        list src_mac '38:8A:06:43:22:9A'
        list src_mac 'FC:02:96:85:9B:F6'
        list src_mac '4C:03:4F:FD:1F:E7'
        option enabled '0'

/etc/config/network

config interface 'loopback'
        option device 'lo'
        option proto 'static'
        option ipaddr '127.0.0.1'
        option netmask '255.0.0.0'

config globals 'globals'
        option ula_prefix 'fd34:c504:20b3::/48'
        option packet_steering '1'

config device
        option name 'br-lan'
        option type 'bridge'
        list ports 'lan1'
        list ports 'lan2'
        list ports 'lan3'
        list ports 'lan4'
        list ports 'lan5'

config device
        option name 'lan1'
        option macaddr '94:83:c4:a3:fa:8d'

config device
        option name 'lan2'
        option macaddr '94:83:c4:a3:fa:8d'

config device
        option name 'lan3'
        option macaddr '94:83:c4:a3:fa:8d'

config device
        option name 'lan4'
        option macaddr '94:83:c4:a3:fa:8d'

config device
        option name 'lan5'
        option macaddr '94:83:c4:a3:fa:8d'

config interface 'lan'
        option device 'br-lan'
        option proto 'static'
        option ipaddr '192.168.1.1'
        option netmask '255.255.255.0'
        option ip6assign '60'

config device
        option name 'eth1'
        option macaddr '94:83:c4:a3:fa:8b'

config interface 'wan'
        option device 'eth1'
        option proto 'dhcp'

config interface 'wan6'
        option device 'eth1'
        option proto 'dhcpv6'
        option reqaddress 'try'
        option reqprefix 'auto'
        option norelease '0'

Maybe diisable Avahi, reboot and test again?

What is Avahi and how I disable it?

EDIT: I googled how to disable, seems like I need to run this command:
/etc/init.d/avahi-daemon disable
Would it affect any services on the router?

I caught it again:

Tue Jul 15 16:01:45 2025 daemon.notice netifd: Interface 'wan6' is now down
Tue Jul 15 16:01:45 2025 daemon.info avahi-daemon[2287]: Withdrawing address record for 2a00:a041:e700:3::3bfb:b55f on eth1.
Tue Jul 15 16:01:45 2025 daemon.info avahi-daemon[2287]: Leaving mDNS multicast group on interface eth1.IPv6 with address 2a00:a041:e700:3::3bfb:b55f.
Tue Jul 15 16:01:45 2025 daemon.info avahi-daemon[2287]: Joining mDNS multicast group on interface eth1.IPv6 with address fe80::9683:c4ff:fea3:fa8b.
Tue Jul 15 16:01:45 2025 daemon.info avahi-daemon[2287]: Registering new address record for fe80::9683:c4ff:fea3:fa8b on eth1.*.
Tue Jul 15 16:01:45 2025 daemon.notice netifd: Interface 'wan6' is setting up now
Tue Jul 15 16:01:45 2025 daemon.info avahi-daemon[2287]: Withdrawing address record for 2a00:a041:e118:b100::1 on br-lan.
Tue Jul 15 16:01:45 2025 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
Tue Jul 15 16:01:45 2025 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 4 names
Tue Jul 15 16:01:45 2025 daemon.info dnsmasq[1]: read /tmp/hosts/odhcpd - 2 names
Tue Jul 15 16:01:45 2025 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
Tue Jul 15 16:01:46 2025 daemon.warn odhcpd[2056]: No default route present, overriding ra_lifetime to 0!
Tue Jul 15 16:01:51 2025 daemon.info hostapd: phy1-ap0: STA 12:e9:08:d6:35:57 IEEE 802.11: authenticated
Tue Jul 15 16:01:51 2025 daemon.info hostapd: phy1-ap0: STA 12:e9:08:d6:35:57 IEEE 802.11: associated (aid 1)
Tue Jul 15 16:01:51 2025 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED 12:e9:08:d6:35:57 auth_alg=sae
Tue Jul 15 16:01:51 2025 daemon.info hostapd: phy1-ap0: STA 12:e9:08:d6:35:57 WPA: pairwise key handshake completed (RSN)
Tue Jul 15 16:01:51 2025 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED 12:e9:08:d6:35:57
Tue Jul 15 16:01:51 2025 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.151 12:e9:08:d6:35:57
Tue Jul 15 16:01:51 2025 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.151 12:e9:08:d6:35:57 Galaxy-S24
Tue Jul 15 16:01:52 2025 daemon.warn odhcpd[2056]: No default route present, overriding ra_lifetime to 0!
Tue Jul 15 16:01:53 2025 daemon.info hostapd: phy0-ap0: STA d6:44:88:5c:b1:09 IEEE 802.11: associated (aid 8)
Tue Jul 15 16:01:53 2025 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED d6:44:88:5c:b1:09 auth_alg=sae
Tue Jul 15 16:01:53 2025 daemon.info hostapd: phy0-ap0: STA d6:44:88:5c:b1:09 WPA: pairwise key handshake completed (RSN)
Tue Jul 15 16:01:53 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED d6:44:88:5c:b1:09
Tue Jul 15 16:01:54 2025 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.136 d6:44:88:5c:b1:09
Tue Jul 15 16:01:54 2025 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.136 d6:44:88:5c:b1:09 Redmi-Note-12
Tue Jul 15 16:01:54 2025 daemon.warn odhcpd[2056]: No default route present, overriding ra_lifetime to 0!
Tue Jul 15 16:02:04 2025 daemon.info hostapd: phy1-ap0: STA 72:85:6b:ee:90:39 IEEE 802.11: associated (aid 2)
Tue Jul 15 16:02:04 2025 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED 72:85:6b:ee:90:39 auth_alg=sae
Tue Jul 15 16:02:04 2025 daemon.info hostapd: phy1-ap0: STA 72:85:6b:ee:90:39 WPA: pairwise key handshake completed (RSN)
Tue Jul 15 16:02:04 2025 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED 72:85:6b:ee:90:39
Tue Jul 15 16:02:04 2025 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.227 72:85:6b:ee:90:39
Tue Jul 15 16:02:04 2025 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.227 72:85:6b:ee:90:39 h-Edna-sl-Galaxy-A71
Tue Jul 15 16:02:04 2025 daemon.info avahi-daemon[2287]: Leaving mDNS multicast group on interface eth1.IPv6 with address fe80::9683:c4ff:fea3:fa8b.
Tue Jul 15 16:02:04 2025 daemon.info avahi-daemon[2287]: Joining mDNS multicast group on interface eth1.IPv6 with address 2a00:a041:e700:3::3bfb:b55f.
Tue Jul 15 16:02:04 2025 daemon.info avahi-daemon[2287]: Registering new address record for 2a00:a041:e700:3::3bfb:b55f on eth1.*.
Tue Jul 15 16:02:04 2025 daemon.info avahi-daemon[2287]: Withdrawing address record for fe80::9683:c4ff:fea3:fa8b on eth1.
Tue Jul 15 16:02:04 2025 daemon.info avahi-daemon[2287]: Registering new address record for 2a00:a041:e118:b100::1 on br-lan.*.
Tue Jul 15 16:02:04 2025 daemon.notice netifd: Interface 'wan6' is now up
Tue Jul 15 16:02:04 2025 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
Tue Jul 15 16:02:04 2025 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 4 names
Tue Jul 15 16:02:04 2025 daemon.info dnsmasq[1]: read /tmp/hosts/odhcpd - 4 names
Tue Jul 15 16:02:04 2025 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
Tue Jul 15 16:02:04 2025 user.notice firewall: Reloading firewall due to ifup of wan6 (eth1)
Tue Jul 15 16:02:18 2025 daemon.notice netifd: wan (3497): udhcpc: sending renew to server 172.18.178.211
Tue Jul 15 16:02:21 2025 daemon.notice netifd: wan (3497): udhcpc: lease of 100.120.222.34 obtained from 172.18.178.211, lease time 1800
Tue Jul 15 16:02:21 2025 user.notice firewall: Reloading firewall due to ifupdate of wan (eth1)
Tue Jul 15 16:02:26 2025 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: dns.msftncsi.com

What is happening? And WHY it happens?

Avahi is an mDNS/DNS-SD (aka RendezVous/Bonjour/ZeroConf) implementation.
I don't think it's included in the standard images, so you must've installed it yourself.

Yes, it would disable the AVAHI service.

You also have to stop Avahi (it is for mDNS): in Luci see under System > Startup.
Stop Avahi, Disable Avahi and then Reboot and check again.

in addition to what you've already posted, provide output of ubus call system board too.

{
        "kernel": "6.6.93",
        "hostname": "OpenWrt",
        "system": "ARMv8 Processor rev 4",
        "model": "GL.iNet GL-MT6000",
        "board_name": "glinet,gl-mt6000",
        "rootfs_type": "squashfs",
        "release": {
                "distribution": "OpenWrt",
                "version": "24.10.2",
                "revision": "r28739-d9340319c6",
                "target": "mediatek/filogic",
                "description": "OpenWrt 24.10.2 r28739-d9340319c6",
                "builddate": "1750711236"
        }
}
1 Like

I'm not sure I did. I installed the official OpenWrt version from here:

Then I installed these:
coreutils-date findutils-find htop nano adguardhome kmod-usb3 kmod-usb-storage-uas usbutils block-mount mount-utils kmod-fs-ext4 luci-app-samba4

I did what you said, unfortunately the problem still persists.

This packet has some AVAHI-related packages as dependencies.
So they were installed together with the above one.

I see, thank you for explaining it to me.
Now however, the Avahi service doesn't work anymore because I disabled it.
I reboot the router and I still don't obtain the correct Gateway. I wait a few minutes - nothing changes. So I proceed to press Restart on Wan6 in Luci, then IPv6 works.
So why doesn't it obtain the correct IPv6 Gateway on reboot?

EDIT: Now after 4 minutes the Gateway is changed again to fe80::1 after this in the logs:

Tue Jul 15 16:38:39 2025 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) 68:39:43:65:5b:2a
Tue Jul 15 16:38:39 2025 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.1.30 68:39:43:65:5b:2a
Tue Jul 15 16:39:30 2025 daemon.notice netifd: wan (3451): udhcpc: sending renew to server 172.18.178.211
Tue Jul 15 16:39:30 2025 daemon.notice netifd: wan (3451): udhcpc: lease of 100.120.222.34 obtained from 172.18.178.211, lease time 1800

192.168.1.30 is my Reolink camera. Maybe it's hacked?

It was worth trying but I really wouldn't expect avahi to affect your routing. Probably it got installed as part of luci-app-samba4 to advertise the samba server? Just a guess.

Maybe try running tcpdump to log all router advertisements.

That gist gives the relevant command. You'll need to install tcpdump and edit the command to use your WAN interface name.

2 Likes

I installed tcpdump.
My WAN is "eth1".
I run this command:
tcpdump -vvvv -ttt -i eth1 icmp6 and 'ip6[40] = 134'
Is that correct?

1 Like

The address 172.18.178.211 is a local address. Is this your uplink to another router?

I'm using ONT.

That's what i wrote a few minutes ago.

So, where does this 172.18.178.211, which seems to play (another) dhcp server, come from?