This router gets the basics right, but the gaps are significant. The hAP ax³ is assembled in China. If any device on your Wi-Fi gets infected — a kid’s tablet, a smart bulb, a guest’s phone — it can reach your work laptop and banking app on the same flat network.
A C grade is not a sign-off. It means there are real, exploitable issues affecting this network every day.
-
The FCC has formally labeled MikroTik a national security threat
The FCC has formally labeled this manufacturer a national security threat. Federal contractors and anyone working remotely for sensitive employers faces specific exposure.
Show technical detail
Foreign manufacture — FCC ban applies: The hAP ax³ is assembled in China. The FCC's March 23, 2026 ban covers manufacturing origin. No US manufacturing exemption is on file.
-
One wrong VLAN tag or firewall rule on this router silently exposes your devices to the open internet
A wrong VLAN tag or a misapplied firewall rule on this router silently exposes your work laptop or your security camera feed to the open internet — with no warning until something goes wrong. Powerful hardware doesn't protect you if a single port is set up wrong.
Show technical detail
RouterOS misconfiguration risk: MikroTik defaults leave multiple management services exposed. Documented cases exist of hAP series routers being compromised through Winbox and API endpoints left open. Hardening is required.
-
A small gap that still touches every device on this network
A small gap, not an urgent one — but it still touches everything on this network: your work laptop, your phone, your security cameras, and any guest device that joins the Wi-Fi.
Show technical detail
WAN-exposed management interface — default: RouterOS exposes management services on all interfaces by default. Explicit firewall rules are required to restrict access to trusted sources only.
If a new vulnerability is found for your MikroTik hAP ax³, we'll email you. One email per incident. No spam.

