The algorithm scores this router 1/100 - an F, the lowest score in our database. Huawei is on the US Commerce Department Entity List - the highest level of US technology restriction. It is banned from all US federal networks by law. No US company can legally service or support this device. This is not a precautionary classification - it is the result of formal government action.
- US Commerce Department Entity List - Huawei is formally designated as a national security threat. This is the highest level of US technology restriction.
- Banned from all US federal networks by law - NDAA 2020, Section 889
- Not legally authorized for US consumer sale - this device should not have been on a US retail shelf
- No US security support pathway exists - no American company can legally service, update, or support this hardware
- Zero security capability score - no VPN, no segmentation, no monitoring, no US-facing security infrastructure
- Still in use in many US homes - often purchased via grey market, imported from Canada, or acquired before 2019 restrictions
- Banned from all US federal networks: Congress banned all Huawei equipment from US government networks in 2020 due to documented national security risks.
- Commerce Department Entity List: Huawei is on the US Entity List - the highest level of US technology restriction. US companies cannot legally service or support this device.
- No legal US warranty, support, or patches: No US company can legally service this router. There is no security support pathway in the United States.
FCC & Ban Risk
2
/100
F
Supply chain · FCC status · CVEs · Patch support
Security Capabilities
0
/100
F
Zero-Trust · VPN · Segmentation · Monitoring
🏭 Manufacturer
Chinese state-linked
Huawei Technologies Co., Ltd. - US Commerce Dept Entity List
Manufactured in: China
🛡️ Patch Support
None in US
Whether security vulnerabilities are actively being patched
⚠️ Key Finding
critical
Banned from all US federal networks
Router Security Updates
Get notified if new vulnerabilities are discovered for your Huawei AX3 Pro. Free, no spam.
🔒
Security capabilities comparison
We benchmark your router against Rio Router across 8 dimensions so you can see exactly what gaps exist - and what a fully-covered setup looks like.
HUAWEI
your router
Rio Router™
full standard
Zero-Trust Device Admission
Every new device is blocked by default - admin must approve it once, even if it has the right password
Not available
Available
Network Segmentation (VLANs)
Devices on your network are isolated from each other, so a hacked smart TV can't reach your laptop
Not available
Available
Router-Level VPN for All Devices
All traffic - including smart devices that can't run VPN apps - is encrypted before leaving your home
Not available
Available
Domain Allowlisting
Block everything except approved sites; more effective than trying to blacklist billions of harmful URLs
Not available
Available
Granular Password Control
Separate passwords per network zone - changing one doesn't affect others
Not available
Available
Guest Auto-Expiry
Guest devices are automatically removed when they leave; neighbors can't reconnect without re-approval
Not available
Available
Clean Supply Chain
Manufactured outside Chinese legal jurisdiction - not subject to China's National Intelligence Law
Not available
Available
Active Threat Monitoring
DNS filtering, firewall, activity logs, and ongoing security patch support
Not available
Available
We use Rio Router as the benchmark because it’s the only consumer router built to score 8/8 on this framework - it shows you what a fully-covered setup looks like, not just what’s typical.
See Rio →
See all Huawei models: Huawei brand overview →
What you should do
1
Stop using this router on any network with sensitive data
2
Replace immediately - this is the highest-risk device we track
3
Contact your retailer - this device should not have been sold in the US
Federally banned from US government networks.
Huawei is the highest-risk manufacturer we track. See our scoring →
How this was scored · verified March 2026: This rating combines FCC authorization status, manufacturer legal jurisdiction, CVEs from NIST NVD, active patch support status, and CISA advisory mentions. See full methodology →
Reference Data
Known CVEs - Huawei brand history
From the NIST National Vulnerability Database. Your specific model may or may not be affected.
RCE via UPnP. Exploited by Satori/Mirai botnet - 70,000+ devices compromised in 2017 attacks.
See all Huawei CVEs: NIST NVD search →
Sources & evidence
All findings trace to publicly verifiable primary sources - US government databases, official FCC filings, and NIST CVE records. No proprietary or anonymous sources are used.
- NDAA 2020 Section 889 ↗
- BIS Entity Listing · 2019 ↗
- FCC Equipment Authorization Database ↗
- FCC Covered List · National Security Designation ↗
Full data source documentation: Scoring Methodology & Citations →
