$ fwupdmgr get-devices
Default string
β
ββSamsung SSD 970 EVO Plus 500GB:
β Device ID: 03281da317dccd2b18de2bd1cc70a782df40ed7e
β Summary: NVM Express solid state drive
β Current version: 2B2QEXM7
β Vendor: Samsung Electronics Co Ltd (NVME:0x144D)
β GUIDs: 0b4d773a-7ac3-58c1-a541-e22ef1cdfe02
β c9d531ea-ee7d-5562-8def-c64d0d144813
β 6e54c992-d302-59ab-b454-2d26ddd63e6d
β 47335265-a509-51f7-841e-1c94911af66b
β 173afe85-89dc-54b2-9a58-a5990e4e4b6a
β Device Flags: β’ Internal device
β β’ Updatable
β β’ System requires external power source
β β’ Needs a reboot after installation
β β’ Device is usable for the duration of the update
β
ββUnifying Receiver:
Device ID: 4588a84d1cfa1ddb273e9df28f6a44927e9b4e99
Summary: Miniaturised USB wireless receiver
Current version: RQR12.07_B0029
Bootloader Version: BOT01.02_B0015
Vendor: HIDRAW:0x046D|USB:0x046D
Install Duration: 30 seconds
GUIDs: 9d131a0c-a606-580f-8eda-80587250b8d6
fcf55bf5-767b-51ce-9c17-f6f538c4ee9f
279ed287-3607-549e-bacc-f873bb9838c4
Device Flags: β’ Updatable
$
$ fwupdmgr refresh
Updating lvfs
Downloadingβ¦ [***************************************] Less than one minute remainingβ¦
Successfully downloaded new metadata: 1 local device supported
$
$ fwupdmgr refresh
Firmware metadata last refresh: 5 seconds ago. Use --force to refresh again.
$
$ fwupdmgr get-updates
Devices with no available firmware updates:
β’ Samsung SSD 970 EVO Plus 500GB
Default string
β
ββUnifying Receiver:
β Device ID: 4588a84d1cfa1ddb273e9df28f6a44927e9b4e99
β Summary: Miniaturised USB wireless receiver
β Current version: RQR12.07_B0029
β Bootloader Version: BOT01.02_B0015
β Vendor: HIDRAW:0x046D|USB:0x046D
β Install Duration: 30 seconds
β GUIDs: 9d131a0c-a606-580f-8eda-80587250b8d6
β fcf55bf5-767b-51ce-9c17-f6f538c4ee9f
β 279ed287-3607-549e-bacc-f873bb9838c4
β Device Flags: β’ Updatable
β β’ Supported on remote server
β
ββUnifying Receiver:
β New version: RQR12.10_B0032
β Remote ID: lvfs
β Summary: Firmware for the Logitech Unifying Receiver (RQR12.xx)
β Licence: Proprietary
β Size: 56.8 kB
β Created: 2019-07-18
β Urgency: High
β Vendor: Logitech
β Duration: 30 seconds
β Flags: is-upgrade
β Description:
β This release addresses an encrypted keystroke injection vulnerability sent by pointing devices. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
β
β A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
β
β β’ Wireless Mouse M335
β β’ Zone Touch Mouse T400
β β’ Wireless Mouse M545
β β’ Wireless Mouse M560
β β’ Touch Mouse M600
β β’ Touch Mouse T620
β β’ Wireless Rechargeable Touchpad T650
β
β Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.
β
ββUnifying Receiver:
New version: RQR12.08_B0030
Remote ID: lvfs
Summary: Firmware for the Logitech Unifying Receiver (RQR12.xx)
Licence: Proprietary
Size: 72.7 kB
Created: 2017-06-26
Urgency: High
Vendor: Logitech
Duration: 30 seconds
Flags: is-upgrade
Description:
This release addresses an encrypted keystroke injection issue known as Bastille security issue #13. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
β’ Wireless Mouse M335
β’ Zone Touch Mouse T400
β’ Wireless Mouse M545
β’ Wireless Mouse M560
β’ Touch Mouse M600
β’ Touch Mouse T620
β’ Wireless Rechargeable Touchpad T650
Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.
$
$ fwupdmgr update
Devices with no available firmware updates:
β’ Samsung SSD 970 EVO Plus 500GB
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β Upgrade Unifying Receiver from RQR12.07_B0029 to RQR12.10_B0032? β
β βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ£
β This release addresses an encrypted keystroke injection vulnerability sent β
β by pointing devices. The vulnerability is complex to replicate and would β
β require a hacker to be physically close to a target. β
β A few of Logitech's devices used to send select buttons in an unencrypted β
β way, and in an effort to protect against this vulnerability, Logitech β
β removed the feature. Affected hardware is: β
β β’ Wireless Mouse M335 β
β β’ Zone Touch Mouse T400 β
β β’ Wireless Mouse M545 β
β β’ Wireless Mouse M560 β
β β’ Touch Mouse M600 β
β β’ Touch Mouse T620 β
β β’ Wireless Rechargeable Touchpad T650 β
β Although Logitech does not recommend it, these features may be re-activated β
β by keeping/downgrading the receiver to an older firmware. β
β Unifying Receiver and all connected devices may not be usable while β
β updating. β
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
Perform operation? [Y|n]:
Downloading⦠[***************************************]
Decompressing⦠[***************************************]
Authenticating⦠[***************************************]
Authenticating⦠[***************************************]
Waiting⦠[***************************************]
Successfully installed firmware
$
$ fwupdmgr update
Devices with no available firmware updates:
β’ Samsung SSD 970 EVO Plus 500GB
Devices with the latest available firmware version:
β’ Unifying Receiver
$
$ fwupdmgr get-updates
Devices with no available firmware updates:
β’ Samsung SSD 970 EVO Plus 500GB
Devices with the latest available firmware version:
β’ Unifying Receiver
No updates available for remaining devices
$
The device works after the update. Anyway I prefer to re-plug USB receiver and to turn off and than on the wireless devices which connects to it. Paired devices were not lost, all works.
It looks like the tool uses alternative/own database of firmware.
Hirenβs BootCD PE (Preinstallation Environment) is a restored edition of Hirenβs BootCD based on Windows 10 PE x64. Since there are no official updates after November 2012, PE version is being developed by Hirenβs BootCD fans.
OMG, now I know how to try to install a Mikrotik routerβs RouterOS firmware w/o installing windows or a linux32 environment (cause for linux it provides only a x86-32 installers (see netinstall on MikroTik Routers and Wireless - Software)):
details
$ ls -lAh
total 36M
-rw-r--r-- 1 m m 127K Sep 16 14:00 LICENSE.txt
-rwxr-xr-x 1 m m 35M Oct 6 15:03 netinstall
$
$ file netinstall
netinstall: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, for GNU/Linux 2.6.16, stripped
$
Did it worked? because the only solution that worked for me was, download a windows iso, create a stick installer with woeusb-ng, in another flash drive copy the bios update file⦠there should be this file only, plug both flash drives, reboot, go to the windows installer, exit to command promt, an there execute the bios .exe file.