
This router has documented security problems. Every device on this network — your work laptop, banking app, Ring camera, smart lock — is running at higher risk than it should be.
An F is not a warning — it’s a finding that the router has been independently flagged for security or supply-chain concerns serious enough to warrant action.
-
This router model was used to break into US military and government networks
This router model was specifically weaponized to infiltrate US military and government networks. The same firmware architecture runs on devices in people's homes.
Show technical detail
Chinese government hackers used this router brand to attack US infrastructure: Chinese state hackers used TP-Link routers as attack infrastructure against US military, government, and critical infrastructure networks. The product line - not specific models - was identified.
-
An attacker on the internet could silently take control of your home network
An attacker anywhere on the internet could take silent control of your network — intercepting banking logins, rerouting your browsing, or recruiting your router into attacks on others.
Show technical detail
A stranger can remotely take control of your router: A 9.8-severity flaw in TP-Link's Archer web interface allowed unauthenticated remote code execution. Actively exploited before patch availability.
-
A US ban could cut off firmware updates with little warning, leaving this router permanently exposed
A US government ban or forced sale could cut off firmware updates with little warning. Once that happens, this router is permanently unprotected.
Show technical detail
The US government is investigating this company and may force a ban: The Department of Justice and FCC opened formal investigations into TP-Link in 2024. A forced divestiture or ban is under active consideration.
-
TP-Link is legally required to share your network data with the Chinese government if asked
The manufacturer is legally required to share your network data with the Chinese government if asked. This isn't theoretical — it's a legal obligation that can't be refused.
Show technical detail
Chinese National Intelligence Law: TP-Link is legally required to cooperate with PRC intelligence requests. This structural risk applies to all TP-Link products regardless of model generation.
An A-rated alternative is shown below.
We'll email you if a new vulnerability hits your TP-Link Archer AX3000. One email per incident. No spam.
- CISA Advisory AA23-144A · 2023 ↗
- CVE-2023-1389 · CVSS 9.8 · NVD ↗
- FCC Equipment Authorization Database ↗
- FCC Covered List · National Security Designation ↗
