That test is *not* meant for this specific upnp exploit.
Yes it is. A new test was recently added to the Shields Up page to test specifically for this exploit (not to be confused with GRC's earlier Unplug n' Play utility, which is designed for UPNP on a Windows system not the router)
The DefenseCode article said the Actiontec is vulnerable and that a lot of routers expose UPnP on their WAN interface. They didn't specifically say which routers do though, so that is good to know.
My Actiontec is bridged with UPnP disabled already before the bridge so I couldn't test it. Being a LAN side exploit reduces the severity a lot.
Very true, but actually patching the vulnerability completely, would provide a peace of mind for a lot of users. Of course, IF the V1000H model is vulnerable (as you said, they didn't specify the router models that were affected).