I would suggest to check if your switch is FG vulnerable or not.
If it is, the only thing you lose by (directly) updating to 5.1 is, perhaps, option of cold booting CFW without inserting anything into USB slot.
If it isn't, then... mm, you'll need to wait for HEN type exploits which might take quite a long time, given how long it takes to crack even SX OS.
(frankly, I'd personally return the switch and tried to get older, vulnerable HW, there should be plenty)
Thanks for this, i did try sending a payload to pull my BIS Keys and that worked so I think that means its FG vulnerable. Is there any downside to staying stock and not linking my switch at all? I have been seeing that one of the exploits needs Pokemon Quest so i was going to try and download that before i NAND backup.
If I may ask, what modelnumber is on the back (HAC-01-ZZZZZZZZ) and give a couple of the first serialnumbers, not all of it, remove like the 4 last.
mine is MOD. HAC-001 unless you are looking fore HAC-SX-UXA-C1. I bought it from Frys using google express on 7/7 (located in California)