Updating firmware for link as modem
You will be able to use this option even before adopting the device, this will be specially useful if you are experiencing issues adopting a device.
For any adopted Uni Fi device you can easily upgrade or change the device firmware from the device Properties window.
Each modem/router has a built-in web server that allows the modem to be configured by any computer via any browser.
In December 2014 Carnegie Mellon University CERT, based on findings by researchers from Check Point’s Malware and Vulnerability Research Group, discovered that some DSL modems/routers have a vulnerability that has existed in the firmware since 2002.
A button will appear on the upper, right-hand of the screen, offering the option to Start Rolling Upgrade if there are UAPs with pending upgrades on the list.
The rest of this article describes how to change the firmware when a simple device upgrade what the user is looking for.
Content Wrapper:after.hidden.normal.grid_page.grid_page:before,.grid_page:after.grid_page:after.grid_page h3.grid_page h3 a.grid_page h3 a:hover.grid_page h3 a.action_button.grid_page h3 a.action_button:active.grid_page h3 a.action_button:hover.grid_page h3 a.action_button:not(.fake_disabled):hover.grid_page h3 a.action_button:not(.fake_disabled):focus.grid_pagediv.
After the router reboot i am not able to connect to it.
as it was giving message says windows cannot connect to this network, so i rebooted the router again, & tried to connect, then start getting message security key miss match. Is it possible i can go to the router page using the ethernet connected??
This problem has been detected in the vulnerable versions of Allegro's Rom Pager that is part of the built-in web server portion of the firmware employed by many modems/routers, including some of those sold by NCF.
For list of affected modem and if they are upgradable or not, continue to read this page, scroll down or check these links Upgradable Units or Non-Upgradable Units The security vulnerability can be fixed in recent modems/routers by upgrading the firmware, replacing the web server with a newer version that does not have the security vulnerability.
The WAN side potential exposure is being investigated and NCF is taking every possible step to ensure your modem/router can't be exploited.