$ pacman -Si fwupd | grep -E "Desc|URL"
Description : Simple daemon to allow session software to update firmware
URL : https://github.com/fwupd/fwupd
Never new it, learned a bit GitHub - fwupd/fwupd: A system daemon to allow session software to update firmware and just update the USB receiver:
details
$ fwupdmgr get-devices
Default string
│
├─Samsung SSD 970 EVO Plus 500GB:
│ Device ID: 03281da317dccd2b18de2bd1cc70a782df40ed7e
│ Summary: NVM Express solid state drive
│ Current version: 2B2QEXM7
│ Vendor: Samsung Electronics Co Ltd (NVME:0x144D)
│ GUIDs: 0b4d773a-7ac3-58c1-a541-e22ef1cdfe02
│ c9d531ea-ee7d-5562-8def-c64d0d144813
│ 6e54c992-d302-59ab-b454-2d26ddd63e6d
│ 47335265-a509-51f7-841e-1c94911af66b
│ 173afe85-89dc-54b2-9a58-a5990e4e4b6a
│ Device Flags: • Internal device
│ • Updatable
│ • System requires external power source
│ • Needs a reboot after installation
│ • Device is usable for the duration of the update
│
└─Unifying Receiver:
Device ID: 4588a84d1cfa1ddb273e9df28f6a44927e9b4e99
Summary: Miniaturised USB wireless receiver
Current version: RQR12.07_B0029
Bootloader Version: BOT01.02_B0015
Vendor: HIDRAW:0x046D|USB:0x046D
Install Duration: 30 seconds
GUIDs: 9d131a0c-a606-580f-8eda-80587250b8d6
fcf55bf5-767b-51ce-9c17-f6f538c4ee9f
279ed287-3607-549e-bacc-f873bb9838c4
Device Flags: • Updatable
$
$ fwupdmgr refresh
Updating lvfs
Downloading… [***************************************] Less than one minute remaining…
Successfully downloaded new metadata: 1 local device supported
$
$ fwupdmgr refresh
Firmware metadata last refresh: 5 seconds ago. Use --force to refresh again.
$
$ fwupdmgr get-updates
Devices with no available firmware updates:
• Samsung SSD 970 EVO Plus 500GB
Default string
│
└─Unifying Receiver:
│ Device ID: 4588a84d1cfa1ddb273e9df28f6a44927e9b4e99
│ Summary: Miniaturised USB wireless receiver
│ Current version: RQR12.07_B0029
│ Bootloader Version: BOT01.02_B0015
│ Vendor: HIDRAW:0x046D|USB:0x046D
│ Install Duration: 30 seconds
│ GUIDs: 9d131a0c-a606-580f-8eda-80587250b8d6
│ fcf55bf5-767b-51ce-9c17-f6f538c4ee9f
│ 279ed287-3607-549e-bacc-f873bb9838c4
│ Device Flags: • Updatable
│ • Supported on remote server
│
├─Unifying Receiver:
│ New version: RQR12.10_B0032
│ Remote ID: lvfs
│ Summary: Firmware for the Logitech Unifying Receiver (RQR12.xx)
│ Licence: Proprietary
│ Size: 56.8 kB
│ Created: 2019-07-18
│ Urgency: High
│ Vendor: Logitech
│ Duration: 30 seconds
│ Flags: is-upgrade
│ Description:
│ This release addresses an encrypted keystroke injection vulnerability sent by pointing devices. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
│
│ A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
│
│ • Wireless Mouse M335
│ • Zone Touch Mouse T400
│ • Wireless Mouse M545
│ • Wireless Mouse M560
│ • Touch Mouse M600
│ • Touch Mouse T620
│ • Wireless Rechargeable Touchpad T650
│
│ Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.
│
└─Unifying Receiver:
New version: RQR12.08_B0030
Remote ID: lvfs
Summary: Firmware for the Logitech Unifying Receiver (RQR12.xx)
Licence: Proprietary
Size: 72.7 kB
Created: 2017-06-26
Urgency: High
Vendor: Logitech
Duration: 30 seconds
Flags: is-upgrade
Description:
This release addresses an encrypted keystroke injection issue known as Bastille security issue #13. The vulnerability is complex to replicate and would require a hacker to be physically close to a target.
A few of Logitech's devices used to send select buttons in an unencrypted way, and in an effort to protect against this vulnerability, Logitech removed the feature. Affected hardware is:
• Wireless Mouse M335
• Zone Touch Mouse T400
• Wireless Mouse M545
• Wireless Mouse M560
• Touch Mouse M600
• Touch Mouse T620
• Wireless Rechargeable Touchpad T650
Although Logitech does not recommend it, these features may be re-activated by keeping/downgrading the receiver to an older firmware.
$
$ fwupdmgr update
Devices with no available firmware updates:
• Samsung SSD 970 EVO Plus 500GB
╔══════════════════════════════════════════════════════════════════════════════╗
║ Upgrade Unifying Receiver from RQR12.07_B0029 to RQR12.10_B0032? ║
╠══════════════════════════════════════════════════════════════════════════════╣
║ This release addresses an encrypted keystroke injection vulnerability sent ║
║ by pointing devices. The vulnerability is complex to replicate and would ║
║ require a hacker to be physically close to a target. ║
║ A few of Logitech's devices used to send select buttons in an unencrypted ║
║ way, and in an effort to protect against this vulnerability, Logitech ║
║ removed the feature. Affected hardware is: ║
║ • Wireless Mouse M335 ║
║ • Zone Touch Mouse T400 ║
║ • Wireless Mouse M545 ║
║ • Wireless Mouse M560 ║
║ • Touch Mouse M600 ║
║ • Touch Mouse T620 ║
║ • Wireless Rechargeable Touchpad T650 ║
║ Although Logitech does not recommend it, these features may be re-activated ║
║ by keeping/downgrading the receiver to an older firmware. ║
║ Unifying Receiver and all connected devices may not be usable while ║
║ updating. ║
╚══════════════════════════════════════════════════════════════════════════════╝
Perform operation? [Y|n]:
Downloading… [***************************************]
Decompressing… [***************************************]
Authenticating… [***************************************]
Authenticating… [***************************************]
Waiting… [***************************************]
Successfully installed firmware
$
$ fwupdmgr update
Devices with no available firmware updates:
• Samsung SSD 970 EVO Plus 500GB
Devices with the latest available firmware version:
• Unifying Receiver
$
$ fwupdmgr get-updates
Devices with no available firmware updates:
• Samsung SSD 970 EVO Plus 500GB
Devices with the latest available firmware version:
• Unifying Receiver
No updates available for remaining devices
$
The device works after the update. Anyway I prefer to re-plug USB receiver and to turn off and than on the wireless devices which connects to it. Paired devices were not lost, all works.
It looks like the tool uses alternative/own database of firmware.
Hiren’s BootCD PE (Preinstallation Environment) is a restored edition of Hiren’s BootCD based on Windows 10 PE x64. Since there are no official updates after November 2012, PE version is being developed by Hiren’s BootCD fans.
OMG, now I know how to try to install a Mikrotik router’s RouterOS firmware w/o installing windows or a linux32 environment (cause for linux it provides only a x86-32 installers (see netinstall
on MikroTik Routers and Wireless - Software)):
details
$ ls -lAh
total 36M
-rw-r--r-- 1 m m 127K Sep 16 14:00 LICENSE.txt
-rwxr-xr-x 1 m m 35M Oct 6 15:03 netinstall
$
$ file netinstall
netinstall: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, for GNU/Linux 2.6.16, stripped
$
Thank you, community!
PS
I am not the OP.