
This router has documented security problems. Every device on this network — your work laptop, banking app, Ring camera, smart lock — is running at higher risk than it should be.
An F is not a warning — it’s a finding that the router has been independently flagged for security or supply-chain concerns serious enough to warrant action.
-
This router model was used to break into US military and government networks
This router model was specifically weaponized to infiltrate US military and government networks. The same firmware architecture runs on devices in people's homes.
Show technical detail
This router shares a platform actively used in Chinese government hacking: The FBI, NSA, and CISA documented TP-Link routers as used in Chinese state hacking of US government and military networks.
-
A US ban could cut off firmware updates with little warning, leaving this router permanently exposed
A US government ban or forced sale could cut off firmware updates with little warning. Once that happens, this router is permanently unprotected.
Show technical detail
The US government is investigating this company and may force a ban: DOJ and FCC investigations into TP-Link continue. Forced sale or product ban remain possible outcomes.
-
A real gap that affects every device sharing this Wi-Fi
It affects every device sharing this Wi-Fi — your work laptop, your phone, your kids' devices, your security cameras. Not the most urgent threat on the page, but a real edge an attacker can use to reach the rest.
Show technical detail
CVE pattern - TP-Link firmware: TP-Link's router firmware has repeated security issues. The high-end platform doesn't change the underlying firmware risk profile.
An A-rated alternative is shown below.
We'll email you if a new vulnerability hits your TP-Link Archer AX6000. One email per incident. No spam.
- CISA Advisory AA23-144A · 2023 ↗
- DOJ/FCC Investigation · 2024 ↗
- CVE-2023-1389 and related NVD entries ↗
- FCC Equipment Authorization Database ↗
- FCC Covered List · National Security Designation ↗
