Systematic Connection Drops / Reception Problems with Cudy M1800

I’m facing a weird problem with only the Cudy M1800s I’m using:

Overall, the WiFi is fine but, when establishing the connection or upon rekeying (also changing to another band), the connection can go into a “stale” state. Where traffic isn’t handled on one end.

Mostly, I’m seeing kernel: wlan0: deauthenticated from 06:0c:43:26:59:97 (Reason: 15=4WAY_HANDSHAKE_TIMEOUT) on the client side. It’s often preceded by this: 09:50:57 wpa_supplicant[823]: wlan0: SME: Trying to authenticate with 06:0c:43:26:59:97 (SSID='vallu3' freq=5240 MHz). Does that mean the AP is triggering a change to the other BSS?

The AP doesn’t have anything about kicking or sending transition request or so to the client.
Most of the time, the router just logs what looks to be regular connection events:

08:50:57 2025 daemon.info hostapd: w5_0-13fb: STA xx:xx:xx:xx:xx:xx IEEE 802.11: authenticated
08:50:57 2025 daemon.info hostapd: w5_0-13fb: STA xx:xx:xx:xx:xx:xx IEEE 802.11: associated (aid 1)
08:50:57 2025 daemon.notice hostapd: w24_0-13fb: Prune association for xx:xx:xx:xx:xx:xx
08:50:57 2025 daemon.notice hostapd: w24_0-13fb: AP-STA-DISCONNECTED xx:xx:xx:xx:xx:xx
08:51:01 2025 daemon.notice hostapd: Beacon request: xx:xx:xx:xx:xx:xx is not connected
08:51:02 2025 daemon.info hostapd: w24_0-13fb: STA xx:xx:xx:xx:xx:xx IEEE 802.11: authenticated
08:51:02 2025 daemon.info hostapd: w24_0-13fb: STA xx:xx:xx:xx:xx:xx IEEE 802.11: associated (aid 1)
08:51:02 2025 daemon.notice hostapd: w5_0-13fb: Prune association for xx:xx:xx:xx:xx:xx
08:51:02 2025 daemon.notice hostapd: w24_0-13fb: AP-STA-CONNECTED xx:xx:xx:xx:xx:xx auth_alg=open
08:51:02 2025 daemon.info hostapd: w24_0-13fb: STA xx:xx:xx:xx:xx:xx RADIUS: starting accounting session E900576602233D57
08:51:02 2025 daemon.info hostapd: w24_0-13fb: STA xx:xx:xx:xx:xx:xx WPA: pairwise key handshake completed (RSN)
08:51:02 2025 daemon.notice hostapd: w24_0-13fb: EAPOL-4WAY-HS-COMPLETED xx:xx:xx:xx:xx:xx
08:51:32 2025 daemon.info hostapd: w5_0-13fb: STA xx:xx:xx:xx:xx:xx IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)

Occasionally, there is a CLASS3_FRAME_FROM_NONASSOC_STA.

The config is really plain:

config wifi-iface 'w24_0_13fb'
option mode 'ap'
option ifname 'w24_0-13fb'
option device 'radio24_0'
option network 'n_1'
option encryption 'psk2'
option key '08150816'
option dtim_period '3'
option ssid 'ssid3'

config wifi-iface 'w5_0_13fb'
option mode 'ap'
option ifname 'w5_0-13fb'
option device 'radio5_0'
option network 'n_1'
option encryption 'psk2'
option key '08150816'
option dtim_period '3'
option ssid 'ssid3'

No idea why the formatting isn’t working..

An identical config on a YunCore AX835 or a Compex WPJ428 doesn’t result in this problem.

My interpretation is that the M1800 is just somehow bad at receiving all packets of a handshake and there’s no reliable way to ask the client to resend the confirmation package.

Is this a good direction? What can I do debug this further?

I have three log files from NetworkManager and wpa_supplicant on the client that I can’t attach here (sadly).
The problem also occurs with an iPhone. Can’t get no logs from that atrocity because there’s no Mac anywhere near.

Please connect to your OpenWrt device using ssh and copy the output of the following commands and post it here using the "Preformatted text </> " button (red circle; this works best in the 'Markdown' composer view in the blue oval):

Screenshot 2025-10-20 at 8.14.14 PM

Remember to redact passwords, VPN keys, MAC addresses and any public IP addresses you may have:

ubus call system board
cat /etc/config/network
cat /etc/config/wireless
cat /etc/config/dhcp
cat /etc/config/firewall

Here’s an excerpt from the first log:

09:50:57 wpa_supplicant[823]: wlan0: WPA: Key negotiation completed with 06:0c:43:26:59:97 [PTK=CCMP GTK=CCMP]
09:50:57 wpa_supplicant[823]: wlan0: Removed BSSID 06:0c:43:26:59:97 from ignore list
09:50:57 wpa_supplicant[823]: wlan0: CTRL-EVENT-CONNECTED - Connection to 06:0c:43:26:59:97 completed [id=0 id_str=]
09:50:57 NetworkManager[775]: <info>  [1766134257.8385] device (wlan0): supplicant interface state: 4way_handshake -> completed
09:50:57 NetworkManager[775]: <info>  [1766134257.8387] device (wlan0): ip:dhcp4: restarting
09:50:57 NetworkManager[775]: <info>  [1766134257.8505] dhcp4 (wlan0): canceled DHCP transaction
09:50:57 NetworkManager[775]: <info>  [1766134257.8505] dhcp4 (wlan0): state changed no lease
09:50:57 NetworkManager[775]: <info>  [1766134257.8506] dhcp4 (wlan0): activation: beginning transaction (timeout in 45 seconds)
09:50:57 NetworkManager[775]: <info>  [1766134257.8508] device (p2p-dev-wlan0): supplicant management interface state: 4way_handshake -> completed
09:51:00 wpa_supplicant[823]: wlan0: CTRL-EVENT-SIGNAL-CHANGE above=0 signal=-82 noise=9999 txrate=720600
09:51:01 kernel: wlan0: deauthenticated from 06:0c:43:26:59:97 (Reason: 15=4WAY_HANDSHAKE_TIMEOUT)

Here’s some debugging enabled for another attempt:

11:45:53 wpa_supplicant[512389]: P2P: Add operating class 126
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=2): 95 9d
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 127
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=2): 99 a1
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 128
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=8): 24 28 2c 30 95 99 9d a1
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 130
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=9): 24 28 2c 30 95 99 9d a1 a5
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 131
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=6): 05 15 25 35 45 55
11:45:53 wpa_supplicant[512389]: P2P: Update channel list
11:45:53 wpa_supplicant[512389]: P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:1>
11:45:53 wpa_supplicant[512389]: P2P: cli_channels:
11:45:53 wpa_supplicant[512389]: WPA: Renewed SNonce - hexdump(len=32): 6c ea b9 e5 0a 51 84 43 8d 64 9b 7a d3 fb 87 07 74 d3 fb 56 ca 3b bf 39 ef 44 93 f6 fd 4f 8c 56
11:45:53 wpa_supplicant[512389]: WPA: PTK derivation using PRF(SHA1)
11:45:53 wpa_supplicant[512389]: WPA: PTK derivation - A1=44:fa:66:57:9a:c9 A2=06:0c:43:26:59:97
11:45:53 wpa_supplicant[512389]: WPA: Nonce1 - hexdump(len=32): 6c ea b9 e5 0a 51 84 43 8d 64 9b 7a d3 fb 87 07 74 d3 fb 56 ca 3b bf 39 ef 44 93 f6 fd 4f 8c 56
11:45:53 wpa_supplicant[512389]: WPA: Nonce2 - hexdump(len=32): 66 04 5b 32 a5 9f e2 16 db aa 4b 07 6c f1 a0 4a 22 8b 0f d5 87 e8 6c bb 74 a9 7d cc 3a 5f 80 e2
11:45:53 wpa_supplicant[512389]: WPA: PMK - hexdump(len=32): [REMOVED]
11:45:53 wpa_supplicant[512389]: WPA: PTK - hexdump(len=48): [REMOVED]
11:45:53 wpa_supplicant[512389]: WPA: KCK - hexdump(len=16): [REMOVED]
11:45:53 wpa_supplicant[512389]: WPA: KEK - hexdump(len=16): [REMOVED]
11:45:53 wpa_supplicant[512389]: WPA: TK - hexdump(len=16): [REMOVED]
11:45:53 wpa_supplicant[512389]: WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00
11:45:53 wpa_supplicant[512389]: WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
11:45:53 wpa_supplicant[512389]: wlan0: WPA: Sending EAPOL-Key 2/4
11:45:53 wpa_supplicant[512389]: WPA: Send EAPOL-Key frame to 06:0c:43:26:59:97 ver=2 mic_len=16 key_mgmt=0x2
11:45:53 wpa_supplicant[512389]: WPA: EAPOL-Key MIC using HMAC-SHA1
11:45:53 wpa_supplicant[512389]: WPA: KCK - hexdump(len=16): [REMOVED]
11:45:53 wpa_supplicant[512389]: WPA: Derived Key MIC - hexdump(len=16): 5c cc 6f d8 e1 5d 3b d9 f8 bc 26 39 bf 3c 48 09
11:45:53 wpa_supplicant[512389]: WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 6c ea b9 e5 0a 51 84 43 8d 64 9b 7a d3 fb 87 07 74 d3 fb>
11:45:53 wpa_supplicant[512389]: nl80211: Send over control port dest=06:0c:43:26:59:97 proto=0x888e len=121 no_encrypt=1
11:45:53 wpa_supplicant[512389]: nl80211: tx_control_port cookie=0xfaf
11:45:53 wpa_supplicant[512389]: nl80211: Event message available
11:45:53 wpa_supplicant[512389]: nl80211: Drv Event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) received for wlan0
11:45:53 wpa_supplicant[512389]: nl80211: Control port TX status (ack=1), cookie=4015
11:45:53 wpa_supplicant[512389]: wlan0: Event EAPOL_TX_STATUS (37) received
11:45:53 wpa_supplicant[512389]: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/0
11:45:53 NetworkManager[512502]: <info>  [1766141153.7555] device (wlan0): supplicant interface state: associated -> 4way_handshake
11:45:53 NetworkManager[512502]: <info>  [1766141153.7555] device (p2p-dev-wlan0): supplicant management interface state: associated -> 4way_handshake
11:45:53 wpa_supplicant[512389]: nl80211: Event message available
11:45:53 wpa_supplicant[512389]: nl80211: BSS Event 129 (NL80211_CMD_CONTROL_PORT_FRAME) received for wlan0
11:45:53 wpa_supplicant[512389]: wlan0: Event EAPOL_RX (23) received
11:45:53 wpa_supplicant[512389]: wlan0: RX EAPOL from 06:0c:43:26:59:97 (encrypted=0)
11:45:53 wpa_supplicant[512389]: RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 cd 54 bc e0 6d 80 cf e9 20 48 f1 08 37 b3 e5 7b 3e e8 95 2c 4a 52 >
11:45:53 wpa_supplicant[512389]: wlan0: IEEE 802.1X RX: version=2 type=3 length=95
11:45:53 wpa_supplicant[512389]: WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 cd 54 bc e0 6d 80 cf e9 20 48 f1 08 37 b3 e5 7b 3e e8 95 >
11:45:53 wpa_supplicant[512389]: wlan0:   EAPOL-Key type=2
11:45:53 wpa_supplicant[512389]: wlan0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
11:45:53 wpa_supplicant[512389]: wlan0:   key_length=16 key_data_length=0
11:45:53 wpa_supplicant[512389]:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
11:45:53 wpa_supplicant[512389]:   key_nonce - hexdump(len=32): cd 54 bc e0 6d 80 cf e9 20 48 f1 08 37 b3 e5 7b 3e e8 95 2c 4a 52 be 14 1a 5b fe 79 34 db 9d 7a
11:45:53 wpa_supplicant[512389]:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
11:45:53 wpa_supplicant[512389]:   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
11:45:53 wpa_supplicant[512389]:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
11:45:53 wpa_supplicant[512389]:   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
11:45:53 wpa_supplicant[512389]: wlan0: WPA: RX message 1 of 4-Way Handshake from 06:0c:43:26:59:97 (ver=2)
11:45:53 wpa_supplicant[512389]: RSN: msg 1/4 key data - hexdump(len=0):
11:45:53 wpa_supplicant[512389]: wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
11:45:53 wpa_supplicant[512389]: WPA: PTK derivation using PRF(SHA1)
11:45:53 wpa_supplicant[512389]: WPA: PTK derivation - A1=44:fa:66:57:9a:c9 A2=06:0c:43:26:59:97
11:45:53 wpa_supplicant[512389]: WPA: Nonce1 - hexdump(len=32): 6c ea b9 e5 0a 51 84 43 8d 64 9b 7a d3 fb 87 07 74 d3 fb 56 ca 3b bf 39 ef 44 93 f6 fd 4f 8c 56
11:45:53 wpa_supplicant[512389]: WPA: Nonce2 - hexdump(len=32): cd 54 bc e0 6d 80 cf e9 20 48 f1 08 37 b3 e5 7b 3e e8 95 2c 4a 52 be 14 1a 5b fe 79 34 db 9d 7a
11:45:53 wpa_supplicant[512389]: WPA: PMK - hexdump(len=32): [REMOVED]
11:45:53 wpa_supplicant[512389]: WPA: PTK - hexdump(len=48): [REMOVED]
11:45:53 wpa_supplicant[512389]: WPA: KCK - hexdump(len=16): [REMOVED]
11:45:53 wpa_supplicant[512389]: WPA: KEK - hexdump(len=16): [REMOVED]
11:45:53 wpa_supplicant[512389]: WPA: TK - hexdump(len=16): [REMOVED]
11:45:53 wpa_supplicant[512389]: WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 8c 00
11:45:53 wpa_supplicant[512389]: WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
11:45:53 wpa_supplicant[512389]: wlan0: WPA: Sending EAPOL-Key 2/4
11:45:53 wpa_supplicant[512389]: WPA: Send EAPOL-Key frame to 06:0c:43:26:59:97 ver=2 mic_len=16 key_mgmt=0x2
11:45:53 wpa_supplicant[512389]: WPA: EAPOL-Key MIC using HMAC-SHA1
11:45:53 wpa_supplicant[512389]: WPA: KCK - hexdump(len=16): [REMOVED]
11:45:53 wpa_supplicant[512389]: WPA: Derived Key MIC - hexdump(len=16): 06 99 4e c0 a3 4c c6 b3 df 9a 90 5f f6 48 49 f6
11:45:53 wpa_supplicant[512389]: WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 6c ea b9 e5 0a 51 84 43 8d 64 9b 7a d3 fb 87 07 74 d3 fb>
11:45:53 wpa_supplicant[512389]: nl80211: Send over control port dest=06:0c:43:26:59:97 proto=0x888e len=121 no_encrypt=1
11:45:53 wpa_supplicant[512389]: nl80211: tx_control_port cookie=0xfb0
11:45:53 wpa_supplicant[512389]: nl80211: Event message available
11:45:53 wpa_supplicant[512389]: nl80211: Drv Event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) received for wlan0
11:45:53 wpa_supplicant[512389]: nl80211: Control port TX status (ack=1), cookie=4016
11:45:53 wpa_supplicant[512389]: wlan0: Event EAPOL_TX_STATUS (37) received
11:45:53 wpa_supplicant[512389]: nl80211: Event message available
11:45:53 wpa_supplicant[512389]: nl80211: BSS Event 129 (NL80211_CMD_CONTROL_PORT_FRAME) received for wlan0
11:45:53 wpa_supplicant[512389]: wlan0: Event EAPOL_RX (23) received
11:45:53 wpa_supplicant[512389]: wlan0: RX EAPOL from 06:0c:43:26:59:97 (encrypted=0)
11:45:53 wpa_supplicant[512389]: RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 cd 54 bc e0 6d 80 cf e9 20 48 f1 08 37 b3 e5 7b 3e e8 95 2c 4a 52>
11:45:53 wpa_supplicant[512389]: wlan0: IEEE 802.1X RX: version=2 type=3 length=151
11:45:53 wpa_supplicant[512389]: WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 cd 54 bc e0 6d 80 cf e9 20 48 f1 08 37 b3 e5 7b 3e e8 95>
11:45:53 wpa_supplicant[512389]: wlan0:   EAPOL-Key type=2
11:45:53 wpa_supplicant[512389]: wlan0:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
11:45:53 wpa_supplicant[512389]: wlan0:   key_length=16 key_data_length=56
11:45:53 wpa_supplicant[512389]:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
11:45:53 wpa_supplicant[512389]:   key_nonce - hexdump(len=32): cd 54 bc e0 6d 80 cf e9 20 48 f1 08 37 b3 e5 7b 3e e8 95 2c 4a 52 be 14 1a 5b fe 79 34 db 9d 7a
11:45:53 wpa_supplicant[512389]:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
11:45:53 wpa_supplicant[512389]:   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
11:45:53 wpa_supplicant[512389]:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
11:45:53 wpa_supplicant[512389]:   key_mic - hexdump(len=16): 0a f2 9a a6 9c c3 fa d0 b3 67 9d a9 7f 88 e4 ab
11:45:53 wpa_supplicant[512389]: WPA: EAPOL-Key MIC using HMAC-SHA1
11:45:53 wpa_supplicant[512389]: RSN: encrypted key data - hexdump(len=56): 41 f9 44 3d 24 b6 c4 e5 aa 92 f0 ef 3c c5 53 83 02 93 c3 7c ce b7 4b 67 1e 1f 03 23 90 fb 4c a8 2f 4e >
11:45:53 wpa_supplicant[512389]: WPA: Decrypt Key Data using AES-UNWRAP (KEK length 16)
11:45:53 wpa_supplicant[512389]: WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
11:45:53 wpa_supplicant[512389]: wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
11:45:53 wpa_supplicant[512389]: wlan0: RSN: RX message 3 of 4-Way Handshake from 06:0c:43:26:59:97 (ver=2)
11:45:53 wpa_supplicant[512389]: WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 d0 3b e3 4b 01 aa 5d>
11:45:53 wpa_supplicant[512389]: WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00
11:45:53 wpa_supplicant[512389]: WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
11:45:53 wpa_supplicant[512389]: wlan0: WPA: Sending EAPOL-Key 4/4
11:45:53 wpa_supplicant[512389]: WPA: Send EAPOL-Key frame to 06:0c:43:26:59:97 ver=2 mic_len=16 key_mgmt=0x2
11:45:53 wpa_supplicant[512389]: WPA: EAPOL-Key MIC using HMAC-SHA1
11:45:53 wpa_supplicant[512389]: WPA: KCK - hexdump(len=16): [REMOVED]
11:45:53 wpa_supplicant[512389]: WPA: Derived Key MIC - hexdump(len=16): e7 a1 11 70 89 29 c3 d6 b3 05 2d 53 9a 00 fa b4
11:45:53 wpa_supplicant[512389]: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >
11:45:53 wpa_supplicant[512389]: nl80211: Send over control port dest=06:0c:43:26:59:97 proto=0x888e len=99 no_encrypt=1
11:45:53 wpa_supplicant[512389]: nl80211: tx_control_port cookie=0xfb1
11:45:53 wpa_supplicant[512389]: wlan0: WPA: Installing PTK to the driver
11:45:53 wpa_supplicant[512389]: wpa_driver_nl80211_set_key: ifindex=2 (wlan0) alg=3 addr=0x55d16db51920 key_idx=0 set_tx=1 seq_len=6 key_len=16 key_flag=0x2c link_id=-1
11:45:53 wpa_supplicant[512389]: nl80211: NEW_KEY
11:45:53 wpa_supplicant[512389]: nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
11:45:53 wpa_supplicant[512389]: nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00
11:45:53 wpa_supplicant[512389]:    addr=06:0c:43:26:59:97
11:45:53 wpa_supplicant[512389]:    pairwise key
11:45:53 wpa_supplicant[512389]: EAPOL: External notification - portValid=1
11:45:53 wpa_supplicant[512389]: wlan0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
11:45:53 wpa_supplicant[512389]: wlan0: Determining shared radio frequencies (max len 2)
11:45:53 wpa_supplicant[512389]: wlan0: Shared frequencies (len=1): completed iteration
11:45:53 wpa_supplicant[512389]: wlan0: freq[0]: 5240, flags=0x1
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 81
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 115
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=4): 24 28 2c 30
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 116
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=2): 24 2c
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 117
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=2): 28 30
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 124
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=4): 95 99 9d a1
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 125
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 126
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=2): 95 9d
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 127
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=2): 99 a1
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 128
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=8): 24 28 2c 30 95 99 9d a1
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 130
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=9): 24 28 2c 30 95 99 9d a1 a5
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 131
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=6): 05 15 25 35 45 55
11:45:53 wpa_supplicant[512389]: P2P: Update channel list
11:45:53 wpa_supplicant[512389]: P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:1>
11:45:53 wpa_supplicant[512389]: P2P: cli_channels:
11:45:53 wpa_supplicant[512389]: RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
11:45:53 wpa_supplicant[512389]: WPA: Group Key - hexdump(len=16): [REMOVED]
11:45:53 wpa_supplicant[512389]: wlan0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16)
11:45:53 wpa_supplicant[512389]: WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
11:45:53 wpa_supplicant[512389]: wpa_driver_nl80211_set_key: ifindex=2 (wlan0) alg=3 addr=0x55d16b516885 key_idx=2 set_tx=0 seq_len=6 key_len=16 key_flag=0x14 link_id=-1
11:45:53 wpa_supplicant[512389]: nl80211: NEW_KEY
11:45:53 wpa_supplicant[512389]: nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
11:45:53 wpa_supplicant[512389]: nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00
11:45:53 wpa_supplicant[512389]:    broadcast key
11:45:53 wpa_supplicant[512389]: wlan0: WPA: Key negotiation completed with 06:0c:43:26:59:97 [PTK=CCMP GTK=CCMP]
11:45:53 wpa_supplicant[512389]: wlan0: Cancelling authentication timeout
11:45:53 wpa_supplicant[512389]: wlan0: Removed BSSID 06:0c:43:26:59:97 from ignore list
11:45:53 wpa_supplicant[512389]: wlan0: State: GROUP_HANDSHAKE -> COMPLETED
11:45:53 wpa_supplicant[512389]: wlan0: Radio work 'sme-connect'@0x55d16dbfce70 done in 0.460751 seconds
11:45:53 wpa_supplicant[512389]: wlan0: radio_work_free('sme-connect'@0x55d16dbfce70): num_active_works --> 0
11:45:53 wpa_supplicant[512389]: wlan0: CTRL-EVENT-CONNECTED - Connection to 06:0c:43:26:59:97 completed [id=0 id_str=]
11:45:53 wpa_supplicant[512389]: nl80211: Set wlan0 operstate 0->1 (UP)
11:45:53 wpa_supplicant[512389]: netlink: Operstate: ifindex=2 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
11:45:53 wpa_supplicant[512389]: bgscan simple: Signal strength threshold -65  Short bgscan interval 30  Long bgscan interval 300
11:45:53 wpa_supplicant[512389]: nl80211: Signal monitor threshold=-65 hysteresis=4
11:45:53 wpa_supplicant[512389]: bgscan simple: Init scan interval: 30
11:45:53 wpa_supplicant[512389]: bgscan: Initialized module 'simple' with parameters '30:-65:300'
11:45:53 wpa_supplicant[512389]: nl80211: Received scan results (12 BSSes)
11:45:53 wpa_supplicant[512389]: nl80211: Scan results indicate BSS status with 06:0c:43:26:59:97 as associated
11:45:53 wpa_supplicant[512389]: wlan0: BSS: Start scan result update 35
11:45:53 wpa_supplicant[512389]: bgscan simple: scan result notification
11:45:53 wpa_supplicant[512389]: wlan0: Determining shared radio frequencies (max len 2)
11:45:53 wpa_supplicant[512389]: wlan0: Shared frequencies (len=1): completed iteration
11:45:53 wpa_supplicant[512389]: wlan0: freq[0]: 5240, flags=0x1
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 81
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=13): 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 115
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=4): 24 28 2c 30
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 116
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=2): 24 2c
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 117
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=2): 28 30
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 124
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=4): 95 99 9d a1
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 125
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=5): 95 99 9d a1 a5
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 126
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=2): 95 9d
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 127
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=2): 99 a1
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 128
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=8): 24 28 2c 30 95 99 9d a1
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 130
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=9): 24 28 2c 30 95 99 9d a1 a5
11:45:53 wpa_supplicant[512389]: P2P: Add operating class 131
11:45:53 wpa_supplicant[512389]: P2P: Channels - hexdump(len=6): 05 15 25 35 45 55
11:45:53 wpa_supplicant[512389]: P2P: Update channel list
11:45:53 wpa_supplicant[512389]: P2P: channels: 81:1,2,3,4,5,6,7,8,9,10,11,12,13 115:36,40,44,48 116:36,44 117:40,48 124:149,153,157,161 125:149,153,157,161,165 126:149,157 127:1>
11:45:53 wpa_supplicant[512389]: P2P: cli_channels:
11:45:53 wpa_supplicant[512389]: EAPOL: External notification - portValid=1
11:45:53 wpa_supplicant[512389]: EAPOL: External notification - EAP success=1
11:45:53 wpa_supplicant[512389]: EAPOL: SUPP_PAE entering state AUTHENTICATING
11:45:53 wpa_supplicant[512389]: EAPOL: SUPP_BE entering state SUCCESS
11:45:53 wpa_supplicant[512389]: EAP: EAP entering state DISABLED
11:45:53 wpa_supplicant[512389]: EAPOL: SUPP_PAE entering state AUTHENTICATED
11:45:53 wpa_supplicant[512389]: EAPOL: Supplicant port status: Authorized
11:45:53 wpa_supplicant[512389]: nl80211: Set supplicant port authorized for 06:0c:43:26:59:97
11:45:53 wpa_supplicant[512389]: EAPOL: SUPP_BE entering state IDLE
11:45:53 wpa_supplicant[512389]: EAPOL authentication completed - result=SUCCESS
11:45:53 wpa_supplicant[512389]: nl80211: Set rekey offload
11:45:53 wpa_supplicant[512389]: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/0
11:45:53 wpa_supplicant[512389]: RTM_NEWLINK: ifi_index=2 ifname=wlan0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
11:45:53 wpa_supplicant[512389]: nl80211: Event message available
11:45:53 wpa_supplicant[512389]: nl80211: Drv Event 139 (NL80211_CMD_CONTROL_PORT_FRAME_TX_STATUS) received for wlan0
11:45:53 wpa_supplicant[512389]: nl80211: Control port TX status (ack=1), cookie=4017
11:45:53 wpa_supplicant[512389]: wlan0: Event EAPOL_TX_STATUS (37) received
11:45:53 wpa_supplicant[512389]: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/0/BSSs/125
11:45:53 wpa_supplicant[512389]: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/0/BSSs/124
11:45:53 wpa_supplicant[512389]: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/0/BSSs/126
11:45:53 wpa_supplicant[512389]: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/0/BSSs/3
11:45:53 wpa_supplicant[512389]: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/0/BSSs/127
11:45:53 wpa_supplicant[512389]: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/0/BSSs/128
11:45:53 NetworkManager[512502]: <info>  [1766141153.8485] device (wlan0): supplicant interface state: 4way_handshake -> completed
11:45:53 wpa_supplicant[512389]: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/0/BSSs/129
11:45:53 wpa_supplicant[512389]: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/0/BSSs/130
11:45:53 wpa_supplicant[512389]: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/0/BSSs/131
11:45:53 wpa_supplicant[512389]: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/0/BSSs/132
11:45:53 wpa_supplicant[512389]: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/0/BSSs/133
11:45:53 wpa_supplicant[512389]: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/0/BSSs/134
11:45:53 NetworkManager[512502]: <info>  [1766141153.8487] device (wlan0): ip:dhcp4: restarting
11:45:53 NetworkManager[512502]: <info>  [1766141153.8605] dhcp4 (wlan0): canceled DHCP transaction
11:45:53 NetworkManager[512502]: <info>  [1766141153.8605] dhcp4 (wlan0): state changed no lease
11:45:53 NetworkManager[512502]: <info>  [1766141153.8605] dhcp4 (wlan0): activation: beginning transaction (timeout in 45 seconds)
11:45:53 NetworkManager[512502]: <info>  [1766141153.8609] device (p2p-dev-wlan0): supplicant management interface state: 4way_handshake -> completed
11:45:53 wpa_supplicant[512389]: nl80211: Event message available
11:45:53 wpa_supplicant[512389]: nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for wlan0
11:45:53 wpa_supplicant[512389]: nl80211: MLME event 59 (NL80211_CMD_FRAME) on wlan0(44:fa:66:57:9a:c9) A1=44:fa:66:57:9a:c9 A2=06:0c:43:26:59:97 on link_id=-1
11:45:53 wpa_supplicant[512389]: nl80211: MLME event frame - hexdump(len=55): d0 00 24 00 44 fa 66 57 9a c9 06 0c 43 26 59 97 06 0c 43 26 59 97 70 00 05 00 16 00 00 26 18 01 00 0>
11:45:53 wpa_supplicant[512389]: nl80211: Frame event
11:45:53 wpa_supplicant[512389]: nl80211: RX frame da=44:fa:66:57:9a:c9 sa=06:0c:43:26:59:97 bssid=06:0c:43:26:59:97 freq=5240 ssi_signal=-79 fc=0xd0 seq_ctrl=0x70 stype=13 (WLAN>
11:45:53 wpa_supplicant[512389]: wlan0: Event RX_MGMT (18) received
11:45:53 wpa_supplicant[512389]: wlan0: Received Action frame: SA=06:0c:43:26:59:97 Category=5 DataLen=30 freq=5240 MHz
11:45:53 wpa_supplicant[512389]: Measurement request type 5 token 1
11:45:53 wpa_supplicant[512389]: RRM: Radio Measurement report - hexdump(len=1365): 27 f8 01 00 05 80 30 00 00 00 00 00 00 00 00 00 00 09 76 ff 06 0c 43 26 59 97 00 00 00 00 00 0>
11:45:53 wpa_supplicant[512389]: nl80211: Send Action frame (ifindex=2, freq=5240 MHz wait=0 ms no_cck=0 offchanok=1 dst=06:0c:43:26:59:97 src=44:fa:66:57:9a:c9 bssid=06:0c:43:26>
11:45:53 wpa_supplicant[512389]: nl80211: CMD_FRAME freq=5240 wait=0 no_cck=0 no_ack=0 offchanok=1
11:45:53 wpa_supplicant[512389]: CMD_FRAME - hexdump(len=1392): d0 00 00 00 06 0c 43 26 59 97 44 fa 66 57 9a c9 06 0c 43 26 59 97 00 00 05 01 16 27 f8 01 00 05 80 30 00 00 00 00 >
11:45:53 wpa_supplicant[512389]: nl80211: Frame TX command accepted; cookie 0xfb2
11:45:53 wpa_supplicant[512389]: nl80211: Event message available
11:45:53 wpa_supplicant[512389]: nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for wlan0
11:45:53 wpa_supplicant[512389]: nl80211: MLME event 60 (NL80211_CMD_FRAME_TX_STATUS) on wlan0(44:fa:66:57:9a:c9) A1=06:0c:43:26:59:97 A2=44:fa:66:57:9a:c9 on link_id=-1
11:45:53 wpa_supplicant[512389]: nl80211: MLME event frame - hexdump(len=1392): d0 00 00 00 06 0c 43 26 59 97 44 fa 66 57 9a c9 06 0c 43 26 59 97 00 00 05 01 16 27 f8 01 00 05 80>
11:45:53 wpa_supplicant[512389]: nl80211: Frame TX status event A1=06:0c:43:26:59:97 stype=13 cookie=0xfb2 ack=1
11:45:53 wpa_supplicant[512389]: nl80211: Frame TX status: cookie=0xfb2 (match) (ack=1)
11:45:53 wpa_supplicant[512389]: wlan0: Event TX_STATUS (16) received
11:45:53 wpa_supplicant[512389]: wlan0: EVENT_TX_STATUS dst=06:0c:43:26:59:97 type=0 stype=13
11:45:53 wpa_supplicant[512389]: Off-channel: Ignore Action TX status - no pending operation
11:45:55 wpa_supplicant[512389]: EAPOL: startWhen --> 0
11:45:55 wpa_supplicant[512389]: EAPOL: disable timer tick
11:45:57 wpa_supplicant[512389]: nl80211: Event message available
11:45:57 wpa_supplicant[512389]: nl80211: Drv Event 64 (NL80211_CMD_NOTIFY_CQM) received for wlan0
11:45:57 wpa_supplicant[512389]: nl80211: Connection quality monitor event: RSSI low
11:45:57 wpa_supplicant[512389]: nl80211: Signal: -80 dBm  txrate: 720600
11:45:57 wpa_supplicant[512389]: nl80211: Noise: 9999 dBm
11:45:57 wpa_supplicant[512389]: wlan0: Event SIGNAL_CHANGE (24) received
11:45:57 wpa_supplicant[512389]: wlan0: CTRL-EVENT-SIGNAL-CHANGE above=0 signal=-80 noise=9999 txrate=720600
11:45:57 wpa_supplicant[512389]: bgscan simple: signal level changed (above=0 current_signal=-80 current_noise=9999 current_txrate=720600))
11:45:57 wpa_supplicant[512389]: dbus: flush_object_timeout_handler: Timeout - sending changed properties of object /fi/w1/wpa_supplicant1/Interfaces/0
11:45:58 kernel: wlan0: deauthenticated from 06:0c:43:26:59:97 (Reason: 15=4WAY_HANDSHAKE_TIMEOUT)
11:45:58 wpa_supplicant[512389]: RTM_NEWLINK: ifi_index=2 ifname=wlan0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
11:45:58 NetworkManager[512502]: <info>  [1766141158.0744] device (wlan0): ip:dhcp4: restarting
11:45:58 NetworkManager[512502]: <info>  [1766141158.0815] dhcp4 (wlan0): canceled DHCP transaction
11:45:58 NetworkManager[512502]: <info>  [1766141158.0815] dhcp4 (wlan0): state changed no lease
11:45:58 NetworkManager[512502]: <info>  [1766141158.0815] dhcp4 (wlan0): activation: beginning transaction (timeout in 45 seconds)
11:45:58 wpa_supplicant[512389]: nl80211: Event message available
11:45:58 wpa_supplicant[512389]: nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
11:45:58 wpa_supplicant[512389]: nl80211: Delete station 06:0c:43:26:59:97
11:45:58 wpa_supplicant[512389]: nl80211: Event message available
11:45:58 wpa_supplicant[512389]: nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlan0
11:45:58 wpa_supplicant[512389]: nl80211: MLME event 39 (NL80211_CMD_DEAUTHENTICATE) on wlan0(44:fa:66:57:9a:c9) A1=44:fa:66:57:9a:c9 A2=06:0c:43:26:59:97 on link_id=-1
11:45:58 wpa_supplicant[512389]: nl80211: MLME event frame - hexdump(len=26): c0 00 24 00 44 fa 66 57 9a c9 06 0c 43 26 59 97 06 0c 43 26 59 97 90 0d 0f 00
11:45:58 wpa_supplicant[512389]: nl80211: Deauthenticate event
11:45:58 wpa_supplicant[512389]: wlan0: Event DEAUTH (11) received
11:45:58 wpa_supplicant[512389]: wlan0: Deauthentication notification
11:45:58 wpa_supplicant[512389]: wlan0:  * reason 15 (4WAY_HANDSHAKE_TIMEOUT)
11:45:58 wpa_supplicant[512389]: wlan0:  * address 06:0c:43:26:59:97
11:45:58 wpa_supplicant[512389]: Deauthentication frame IE(s) - hexdump(len=0): [NULL]
11:45:58 wpa_supplicant[512389]: wlan0: CTRL-EVENT-DISCONNECTED bssid=06:0c:43:26:59:97 reason=15

And a longer stretch of time:

Hi :slight_smile:

Sure!

$ ubus call system board
{
	"kernel": "6.12.60",
	"hostname": "n996",
	"system": "MediaTek MT7621 ver:1 eco:3",
	"model": "Cudy M1800",
	"board_name": "cudy,m1800",
	"rootfs_type": "squashfs",
	"release": {
		"distribution": "OpenWrt",
		"version": "SNAPSHOT",
		"firmware_url": "https://downloads.openwrt.org/",
		"revision": "r32383-2ad55cca12",
		"target": "ramips/mt7621",
		"description": "OpenWrt SNAPSHOT r32383-2ad55cca12",
		"builddate": "1765978122"
	}
}
$ cat /etc/config/network

config interface 'loopback'
	option device 'lo'
	option proto 'static'
	list ipaddr '127.0.0.1/8'

config globals 'globals'
	option dhcp_default_duid '0004cb36f4cd475f450f8c499753023fee00'
	option ula_prefix 'fd7d:4ead:c07a::/48'
	option packet_steering '1'

config interface 'n_1'
	option force_link '1'
	option device 'br-n_1'
	option proto 'dhcp'
	option dns_metric '3'

config device 'dn_1'
	option type 'bridge'
	option stp '0'
	option isolate '0'
	option bridge_empty '1'
	option name 'br-n_1'
	list ports 'lan'
	list ports 'wan'
	list ports 'bat0'
	option macaddr 'b4:4b:d6:2e:cd:f0'

config interface '6n_1'
	option device '@n_1'
	option proto 'dhcpv6'
	option ip6table '1'
$ cat /etc/config/wireless

config wifi-device 'radio24_0'
  option type 'mac80211'
  option path '1e140000.pcie/pci0000:00/0000:00:01.0/0000:02:00.0'
  option band '2g'
  option channel '6'
  option htmode 'HE40'
  option country 'DE'

config wifi-device 'radio5_0'
  option type 'mac80211'
  option path '1e140000.pcie/pci0000:00/0000:00:01.0/0000:02:00.0+1'
  option band '5g'
  option channel '48'
  option htmode 'HE80'
  option country 'DE'

config wifi-iface 'w24_0_13fb'
  option mode 'ap'
  option ifname 'w24_0-13fb'
  option device 'radio24_0'
  option network 'n_1'
  option encryption 'psk2'
  option key '08150816'
  option dtim_period '3'
  option ssid 'ssid3'

config wifi-iface 'w5_0_13fb'
  option mode 'ap'
  option ifname 'w5_0-13fb'
  option device 'radio5_0'
  option network 'n_1'
  option encryption 'psk2'
  option key '08150816'
  option dtim_period '3'
  option ssid 'ssid3'
$ cat /etc/config/dhcp

config dnsmasq
  option domainneeded '1'
  option boguspriv '1'
  option filterwin2k '0'
  option localise_queries '1'
  option rebind_protection '1'
  option rebind_localhost '1'
  option local '/lan/'
  option domain 'lan'
  option expandhosts '1'
  option nonegcache '0'
  option cachesize '1000'
  option authoritative '1'
  option readethers '1'
  option leasefile '/tmp/dhcp.leases'
  option resolvfile '/tmp/resolv.conf.d/resolv.conf.auto'
  option nonwildcard '1'
  option localservice '1'
  option ednspacket_max '1232'
  option filter_aaaa '0'
  option filter_a '0'

config odhcpd 'odhcpd'
  option maindhcp '0'
  option leasefile '/tmp/odhcpd.leases'
  option leasetrigger '/usr/sbin/odhcpd-update'
  option loglevel '4'
  option piodir '/tmp/odhcpd-piodir'
  option hostsdir '/tmp/hosts'

config dhcp 'n_1'
  option interface 'n_1'
  option ignore '1'

no /etc/config/firewall, it’s not installed

I'd start by downgrading to stable...

wifi joins the network which is dhcp client. i'd reset the device and start fresh to clean up the whole mess.

actually, i’m more interested in finding the cause of the problem than having a stable home setup.

but a bisect is always an option :smiley: