Wi-Fi SSID Disappears and Internet Disconnects; Only Power Cycle Fixes

I’m experiencing a recurring issue with my OpenWrt router model TL-WR850N. Specifically:

  • Sometimes my Wi-Fi disconnects completely, and the SSID disappears.
  • During these periods, devices cannot connect, and the internet is unavailable.
  • The problem is temporarily fixed only by powering off and on the router, which is inconvenient and time-consuming.

I have pasted the log, and after 17:50, the Wi-Fi goes down and the SSID disappears for an extended period. The problem is only fixed by powering the router off and on.

Sun Oct  5 18:17:15 2025 kern.notice kernel: [    0.000000] Linux version 6.6.93 (builder@buildhost) (mipsel-openwrt-linux-musl-gcc (OpenWrt GCC 13.3.0 r28739-d9340319c6) 13.3.0, GNU ld (GNU Binutils) 2.42) #0 Mon Jun 23 20:40:36 2025
Sun Oct 5 17:52:15 2025 daemon.warn odhcpd[1375]: No default route present, overriding ra_lifetime to 0!
Sun Oct 5 17:52:47 2025 daemon.warn odhcpd[1375]: No default route present, overriding ra_lifetime to 0!
Sun Oct 5 17:55:19 2025 daemon.warn odhcpd[1375]: No default route present, overriding ra_lifetime to 0!
Sun Oct 5 17:55:53 2025 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED 4e:92:02:65:57:fd
Sun Oct 5 17:55:53 2025 daemon.info hostapd: phy0-ap0: STA 4e:92:02:65:57:fd IEEE 802.11: disassociated due to inactivity
Sun Oct 5 17:55:54 2025 daemon.info hostapd: phy0-ap0: STA 4e:92:02:65:57:fd IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sun Oct 5 17:55:59 2025 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED 72:d2:67:35:c6:9f
Sun Oct 5 17:55:59 2025 daemon.info hostapd: phy0-ap0: STA 72:d2:67:35:c6:9f IEEE 802.11: disassociated due to inactivity
Sun Oct 5 17:56:00 2025 daemon.info hostapd: phy0-ap0: STA 72:d2:67:35:c6:9f IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sun Oct 5 17:57:52 2025 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED 88:00:d4:c3:80:2b
Sun Oct 5 17:57:52 2025 daemon.info hostapd: phy0-ap0: STA 88:00:d4:c3:80:2b IEEE 802.11: disassociated due to inactivity
Sun Oct 5 17:57:53 2025 daemon.info hostapd: phy0-ap0: STA 88:00:d4:c3:80:2b IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sun Oct 5 17:58:00 2025 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED 0e:4f:22:75:21:ca
Sun Oct 5 17:58:00 2025 daemon.info hostapd: phy0-ap0: STA 0e:4f:22:75:21:ca IEEE 802.11: disassociated due to inactivity
Sun Oct 5 17:58:01 2025 daemon.info hostapd: phy0-ap0: STA 0e:4f:22:75:21:ca IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sun Oct 5 17:58:09 2025 kern.info kernel: [ 687.148836] rt3050-esw 10110000.esw: port 2 link down
Sun Oct 5 17:58:09 2025 kern.info kernel: [ 687.203366] rt3050-esw 10110000.esw: port 4 link down
Sun Oct 5 18:00:14 2025 daemon.warn odhcpd[1375]: No default route present, overriding ra_lifetime to 0!

wireless config

config wifi-device 'radio0'
	option type 'mac80211'
	option path 'platform/10300000.wmac'
	option band '2g'
	option channel '1'
	option htmode 'HT20'
	option cell_density '0'
	option country 'BD'

config wifi-iface 'default_radio0'
	option device 'radio0'
	option network 'lan'
	option mode 'ap'
	option ssid 'A#R'
	option encryption 'psk2'
	option key '5544332211'
	option disassoc_low_ack '0'

network config

config interface 'loopback'
	option device 'lo'
	option proto 'static'
	option ipaddr '127.0.0.1'
	option netmask '255.0.0.0'

config globals 'globals'
	option ula_prefix 'fd0b:10e6:6e49::/48'

config device
	option name 'br-lan'
	option type 'bridge'
	list ports 'eth0.1'

config interface 'lan'
	option device 'br-lan'
	option proto 'static'
	option ipaddr '192.168.1.1'
	option netmask '255.255.255.0'
	option ip6assign '60'

config device
	option name 'eth0.2'
	option macaddr 'd8:07:b6:b2:00:ff'

config interface 'wan'
	option device 'eth0.2'
	option proto 'pppoe'
	option username '********'
	option password '********'
	option ipv6 '0'

config interface 'wan6'
	option device 'eth0.2'
	option proto 'dhcpv6'

config switch
	option name 'switch0'
	option reset '1'
	option enable_vlan '1'

config switch_vlan
	option device 'switch0'
	option vlan '1'
	option ports '1 2 3 4 6t'

config switch_vlan
	option device 'switch0'
	option vlan '2'
	option ports '0 6t'

I’m looking for solutions so that:

  1. The SSID stays visible at all times,
  2. The internet connection remains stable,
  3. I can avoid having to power cycle the router.

Thanks in advance!

Assuming you have not installed other packages, my guess would be that this is a power issue. Likely a failing external power brick. Replace with one with the same rating or one that has greater current capacity.

sysupgrade (eg using owut) to 24.10.3 (kernel ….104)

then

Please connect to your OpenWrt device using ssh and copy the output of the following commands and post it here using the "Preformatted text </> " button:
grafik
Remember to redact passwords, VPN keys, MAC addresses and any public IP addresses you may have:

ubus call system board
cat /etc/config/network
cat /etc/config/wireless
cat /etc/config/dhcp
cat /etc/config/firewall

Thank you for your reply. Previously, a family member faced this problem and had to take similar steps to fix it. After I returned home, I set the country, disabled IPv6 on the WAN, and unchecked the “Disassociate On Low Acknowledgement” option. This improved the connection. Now, the SSID rarely disappears, but the problem still persists. Previously, when it disappeared, another router connected via the LAN port worked perfectly fine. I am therefore confused and wondering if it could be a power-related issue.

Thank you for your reply, here is the output one by one
system board

{
	"kernel": "6.6.93",
	"hostname": "OpenWrt",
	"system": "MediaTek MT7628AN ver:1 eco:2",
	"model": "TP-Link TL-WR850N v2",
	"board_name": "tplink,tl-wr850n-v2",
	"rootfs_type": "squashfs",
	"release": {
		"distribution": "OpenWrt",
		"version": "24.10.2",
		"revision": "r28739-d9340319c6",
		"target": "ramips/mt76x8",
		"description": "OpenWrt 24.10.2 r28739-d9340319c6",
		"builddate": "1750711236"
	}
}

network

config interface 'loopback'
	option device 'lo'
	option proto 'static'
	option ipaddr '127.0.0.1'
	option netmask '255.0.0.0'

config globals 'globals'
	option ula_prefix 'fd0b:10e6:6e49::/48'

config device
	option name 'br-lan'
	option type 'bridge'
	list ports 'eth0.1'

config interface 'lan'
	option device 'br-lan'
	option proto 'static'
	option ipaddr '192.168.1.1'
	option netmask '255.255.255.0'
	option ip6assign '60'

config device
	option name 'eth0.2'
	option macaddr '*********'

config interface 'wan'
	option device 'eth0.2'
	option proto 'pppoe'
	option username '*******'
	option password '********'
	option ipv6 '0'

config interface 'wan6'
	option device 'eth0.2'
	option proto 'dhcpv6'

config switch
	option name 'switch0'
	option reset '1'
	option enable_vlan '1'

config switch_vlan
	option device 'switch0'
	option vlan '1'
	option ports '1 2 3 4 6t'

config switch_vlan
	option device 'switch0'
	option vlan '2'
	option ports '0 6t'

wireless

config wifi-device 'radio0'
	option type 'mac80211'
	option path 'platform/10300000.wmac'
	option band '2g'
	option channel '1'
	option htmode 'HT20'
	option cell_density '0'
	option country 'BD'

config wifi-iface 'default_radio0'
	option device 'radio0'
	option network 'lan'
	option mode 'ap'
	option ssid '**'
	option encryption 'psk2'
	option key '*******'

dhcp

config dnsmasq
	option domainneeded '1'
	option boguspriv '1'
	option filterwin2k '0'
	option localise_queries '1'
	option rebind_protection '1'
	option rebind_localhost '1'
	option local '/lan/'
	option domain 'lan'
	option expandhosts '1'
	option nonegcache '0'
	option cachesize '1000'
	option authoritative '1'
	option readethers '1'
	option leasefile '/tmp/dhcp.leases'
	option resolvfile '/tmp/resolv.conf.d/resolv.conf.auto'
	option nonwildcard '1'
	option localservice '1'
	option ednspacket_max '1232'
	option filter_aaaa '0'
	option filter_a '0'

config dhcp 'lan'
	option interface 'lan'
	option start '100'
	option limit '150'
	option leasetime '12h'
	option dhcpv4 'server'
	option dhcpv6 'server'
	option ra 'server'
	option ra_slaac '1'
	list ra_flags 'managed-config'
	list ra_flags 'other-config'

config dhcp 'wan'
	option interface 'wan'
	option ignore '1'

config odhcpd 'odhcpd'
	option maindhcp '0'
	option leasefile '/tmp/hosts/odhcpd'
	option leasetrigger '/usr/sbin/odhcpd-update'
	option loglevel '4'

and firewall

config defaults
	option input 'ACCEPT'
	option output 'ACCEPT'
	option forward 'ACCEPT'
	option synflood_protect '1'

config zone
	option name 'lan'
	list network 'lan'
	option input 'ACCEPT'
	option output 'ACCEPT'
	option forward 'ACCEPT'

config zone
	option name 'wan'
	list network 'wan'
	list network 'wan6'
	option input 'ACCEPT'
	option output 'ACCEPT'
	option forward 'ACCEPT'
	option masq '1'
	option mtu_fix '1'

config forwarding
	option src 'lan'
	option dest 'wan'

config rule
	option name 'Allow-DHCP-Renew'
	option src 'wan'
	option proto 'udp'
	option dest_port '68'
	option target 'ACCEPT'
	option family 'ipv4'

config rule
	option name 'Allow-Ping'
	option src 'wan'
	option proto 'icmp'
	option icmp_type 'echo-request'
	option family 'ipv4'
	option target 'ACCEPT'

config rule
	option name 'Allow-IGMP'
	option src 'wan'
	option proto 'igmp'
	option family 'ipv4'
	option target 'ACCEPT'

config rule
	option name 'Allow-DHCPv6'
	option src 'wan'
	option proto 'udp'
	option dest_port '546'
	option family 'ipv6'
	option target 'ACCEPT'

config rule
	option name 'Allow-MLD'
	option src 'wan'
	option proto 'icmp'
	option src_ip 'fe80::/10'
	list icmp_type '130/0'
	list icmp_type '131/0'
	list icmp_type '132/0'
	list icmp_type '143/0'
	option family 'ipv6'
	option target 'ACCEPT'

config rule
	option name 'Allow-ICMPv6-Input'
	option src 'wan'
	option proto 'icmp'
	list icmp_type 'echo-request'
	list icmp_type 'echo-reply'
	list icmp_type 'destination-unreachable'
	list icmp_type 'packet-too-big'
	list icmp_type 'time-exceeded'
	list icmp_type 'bad-header'
	list icmp_type 'unknown-header-type'
	list icmp_type 'router-solicitation'
	list icmp_type 'neighbour-solicitation'
	list icmp_type 'router-advertisement'
	list icmp_type 'neighbour-advertisement'
	option limit '1000/sec'
	option family 'ipv6'
	option target 'ACCEPT'

config rule
	option name 'Allow-ICMPv6-Forward'
	option src 'wan'
	option dest '*'
	option proto 'icmp'
	list icmp_type 'echo-request'
	list icmp_type 'echo-reply'
	list icmp_type 'destination-unreachable'
	list icmp_type 'packet-too-big'
	list icmp_type 'time-exceeded'
	list icmp_type 'bad-header'
	list icmp_type 'unknown-header-type'
	option limit '1000/sec'
	option family 'ipv6'
	option target 'ACCEPT'

config rule
	option name 'Allow-IPSec-ESP'
	option src 'wan'
	option dest 'lan'
	option proto 'esp'
	option target 'ACCEPT'

config rule
	option name 'Allow-ISAKMP'
	option src 'wan'
	option dest 'lan'
	option dest_port '500'
	option proto 'udp'
	option target 'ACCEPT'

config rule
	option src 'wan'
	option dest 'lan'
	option name 'Allow-SSH-WAN'
	list proto 'tcp'
	option dest_port '22'
	option target 'ACCEPT'

I kind of asked you to upgrade to 24.10.3

Allowing SSH from WAN with password calls all the botnets attacking your SSH and running out of memory. Disable that firewall rule about yesterday.

Thank you for your suggestions. I’d like to ask a few questions regarding updates. I want the WAN interface to be enabled by default after a system reset. Do I need to build a custom image with these rules, or is there another way to achieve this? As a new user, I would really appreciate clear step-by-step guidance. Also, could you please suggest the best way to access SSH without using the LAN port, in a way that doesn’t affect the device’s memory usage?

install either luci-app-attendedsysupgrade or owut command line and upgrade with all settings intact.

you have to set up ssh public key (and disable password - it takes just 2 MB RAM for one password guesser, you have like place for 10 of those not more besides eating YOUR PRIVATE RESOURCES for no benefit) to be safe and limit connection rate significantly (your connections will be sloooow to coneect too)

Preferably set up some VPN (very tricky with small resources), and ddns (same)

Not related to your issue,but…

This is wrong and very dangerous. Input and forward should be set to reject.

And this is not advisable. Remove this rule, too:

Anyway, your device is very old, and it is common for power supplies to fail.

If you have another one, swap it out. But don’t spend money on a new adapter - just but a new router since this one is quite ancient.

Thank you for your suggestions, after your advice I change these.

Reset configuration and do bare minimum to get PPPOE and wifi up

do not punch firewall holes, you be hacked in no time, good for you hakers upload large backdoor files and crash the router.

Your suggestions helped me a lot. I successfully upgrade the router and enabled SSH, and removed the firewall rules I had created for access without LAN. Thanks for saving my time.

However, if my router is reset while I’m not present, it might cause problems since the WAN is disabled by default. Is there any way to set it to turn on automatically after a reset, so that anyone can connect via Wi-Fi and configure the router?

Save WAN parameters and enter them over default config

Your configs are too dangerous.

This is the firewall configuration after fix them

config defaults
	option input 'REJECT'
	option output 'ACCEPT'
	option forward 'REJECT'
	option synflood_protect '1'

config zone
	option name 'lan'
	list network 'lan'
	option input 'ACCEPT'
	option output 'ACCEPT'
	option forward 'ACCEPT'

config zone
	option name 'wan'
	list network 'wan'
	list network 'wan6'
	option input 'REJECT'
	option output 'ACCEPT'
	option forward 'REJECT'
	option masq '1'
	option mtu_fix '1'

config forwarding
	option src 'lan'
	option dest 'wan'

config rule
	option name 'Allow-DHCP-Renew'
	option src 'wan'
	option proto 'udp'
	option dest_port '68'
	option target 'ACCEPT'
	option family 'ipv4'

config rule
	option name 'Allow-Ping'
	option src 'wan'
	option proto 'icmp'
	option icmp_type 'echo-request'
	option family 'ipv4'
	option target 'ACCEPT'

config rule
	option name 'Allow-IGMP'
	option src 'wan'
	option proto 'igmp'
	option family 'ipv4'
	option target 'ACCEPT'

config rule
	option name 'Allow-DHCPv6'
	option src 'wan'
	option proto 'udp'
	option dest_port '546'
	option family 'ipv6'
	option target 'ACCEPT'

config rule
	option name 'Allow-MLD'
	option src 'wan'
	option proto 'icmp'
	option src_ip 'fe80::/10'
	list icmp_type '130/0'
	list icmp_type '131/0'
	list icmp_type '132/0'
	list icmp_type '143/0'
	option family 'ipv6'
	option target 'ACCEPT'

config rule
	option name 'Allow-ICMPv6-Input'
	option src 'wan'
	option proto 'icmp'
	list icmp_type 'echo-request'
	list icmp_type 'echo-reply'
	list icmp_type 'destination-unreachable'
	list icmp_type 'packet-too-big'
	list icmp_type 'time-exceeded'
	list icmp_type 'bad-header'
	list icmp_type 'unknown-header-type'
	list icmp_type 'router-solicitation'
	list icmp_type 'neighbour-solicitation'
	list icmp_type 'router-advertisement'
	list icmp_type 'neighbour-advertisement'
	option limit '1000/sec'
	option family 'ipv6'
	option target 'ACCEPT'

config rule
	option name 'Allow-ICMPv6-Forward'
	option src 'wan'
	option dest '*'
	option proto 'icmp'
	list icmp_type 'echo-request'
	list icmp_type 'echo-reply'
	list icmp_type 'destination-unreachable'
	list icmp_type 'packet-too-big'
	list icmp_type 'time-exceeded'
	list icmp_type 'bad-header'
	list icmp_type 'unknown-header-type'
	option limit '1000/sec'
	option family 'ipv6'
	option target 'ACCEPT'

config rule
	option name 'Allow-IPSec-ESP'
	option src 'wan'
	option dest 'lan'
	option proto 'esp'
	option target 'ACCEPT'

config rule
	option name 'Allow-ISAKMP'
	option src 'wan'
	option dest 'lan'
	option dest_port '500'
	option proto 'udp'
	option target 'ACCEPT'

Can you help me in this?

You would not want to post your internet password on firmware-selector.