If you own a Belkin SOHO upgradable KVM switch, you can upgrade your switch's firmware as long as you have access to the Internet with at least one of your computers.

I thought manufacturers made 1 model for a particular model number and firmware updates were applicable to the model. Select a product below: ADSL Modem With Built-In 11g Wireless Router F5D7632-4_v2000 ADSL Modem with Wireless-G Router F5D7632-4_V3000 F5D7632ef4 F5D7632ef4 ADSL Modem With Built-In 11g Wireless Router F5D7632uk4 ADSL Modem with Wireless-G Router F5D7632uk4 ADSL Modem With Built-In 11g Wireless Router F5D7632uk4_V2 "F5D7632uk4ADSL Modem With Built-In 11g Wireless Router"That's how mine is described, but with a version 2000 suffix.
Frankly, everyone should approach all kinds of firmware and BIOS updates for any device with the attitude that if it isn't broken, don't try to fix it.
Silket is pursuing a Bachelor of Arts in business management and network technologies at Lehigh Carbon Community College.
Ok I have search a good bit online surfing the net, and 3 calls to Belkin 3 calls to T-mobile and nothing.
It’s not inconsivable that in the near future, Kitchen Aid will have to issue a security patch for a toaster or blender.
CWE-330: Use of Insufficiently Random Values - CVE-2015-5987 DNS queries originating from the Belkin N600, such as those to resolve the names of firmware update and NTP servers, use predictable TXIDs that start at 0x0002 and increase incrementally.
I would just like to warn anybody who owns the v2000 vesrion of the belkin F5D7632-4 adsl modem router to be extremely cautious in updating their firmware to the latest 1.01.10 version which has recently appeared on the official belkin website.
When I updated to the new firmware it completely ruined the wireless connectivity of my router and as a result I had to replace the router.
So IOActive turned to CERT who also issued a statement.
However, per a statement Belkin sent to Tech Crunch (embedded below), Belkin was in fact in contact with the security research firm prior to their public statement.
Specifically, Mike Davis, IOActive’s principal research scientist, identified that through several different means, hackers could remotely access Internet-connected We Mo products, upload custom firmware, remotely monitor devices and access local networks.