Updating airport extreme

Apple maintains older firmware versions on its download page, and they are easily applied from a familiar installer interface.To check which Air Port Base station firmware revision you currently have installed, use the following process: Toggling Air Port Extreme firmware The latest Air Port Extreme firmware version is 5.7 and this edition should be used primarily.As such, it's best to take a shotgun approach, throwing a number of possible fixes at the problem and hoping one sticks.

"About Air Port Base Station Firmware Update 7.7.7 Information Firmware update 7.7.7 is recommended for all Air Port Extreme and Air Port Time Capsule base stations with 802.11ac.This update improves the stability and performance of your base station.For example, you might create a web page that references an image that claims to be stored on a server at the offending domain.It doesn’t matter whether that image really exists, or even if there’s a web server to host images at all.802.11N Air Port Base Stations/Time Capsule Firmware Update 7.6.7: For Air Port Extreme, Air Port Time Capsule, and Air Port Express base stations with 802.11n. Change list same as AC base update.) "About Air Port Base Station Firmware Update 7.6.7 Firmware update 7.6.7 is recommended for all Apple 802.11n Wi-Fi base stations including Air Port Express, Air Port Extreme and Air Port Time Capsule.

This update: Addresses potential naming conflicts with Bonjour Sleep Proxy For detailed information on Air Port base station firmware updates, including instructions how to install the update, please visit: user said he updated his Airport Extreme, and "instantly my Airport express fell off of Air Port Utility, saying it is no longer compatible".

All that matters is that some device on the target network should decide to ask an unpatched Air Port router, “Where do I find ?

” The router will then pass this question on to the global DNS network, which will answer by referring the router to your own, booby-trapped DNS server, assuming that’s registered as the official DNS server for your “attack domain.” Your “attack domain” can then send back a booby-trapped reply to take control of the victim’s router remotely, and thereby potentially to compromise his entire network.

Sadly, it’s easier than you might think to feed booby-trapped DNS replies to a router you want to attack.

All you need to do is register a domain name, such as ; set up a booby-trapped DNS server to answer queries about the domain; and send your victims some sort of content that includes a reference to the booby-trapped domain.

Apple just rolled out a security fix for its Air Port range of wireless routers.