Do you have any clue of the probability of someone creating a different R&S signed FW package with the same MD5 hash as the one you downloaded?
MD5 is so well and truly broken, individuals were able to easily create collision *20 years ago*.
Does that make it probable that someone would want to create fake firmware? No. Is it easy to use SHA256 instead of MD5 to guard against the very unlikely chance that some troll is having some fun? Yes.
Only R&S would be able to try such thing (because of the signature)
As a professional who works with bootstrapping including firmware validation, I am well aware how many buggy implementations of validation there are out there (I know you are, too). I don't know about R&S's, and I also think my scope is a very unlikely attack vector, but...
... it's so easy to get a SHA256 hash instead of an MD5 one, so why not just do it? If not anything else, it fosters hygiene and the death of MD5.