This router has documented security problems. Every device on this network — your work laptop, banking app, Ring camera, smart lock — is running at higher risk than it should be.
An F is not a warning — it’s a finding that the router has been independently flagged for security or supply-chain concerns serious enough to warrant action.
-
Every device on your home network is exposed through a single point of failure
Every device on your home network — phones, laptops, security cameras, smart speakers, baby monitors, smart locks — routes through this single point of failure. A flaw at this severity puts all of them in reach of one attacker.
Show technical detail
This router shares a platform actively used in Chinese government hacking: Shares TP-Link's platform, actively exploited by Chinese state hackers.
-
Anyone connected to your Wi-Fi can change router settings without the admin password
Anyone connected to your Wi-Fi, including guests or compromised devices, could change router settings without knowing the admin password.
Show technical detail
Your router can be accessed without a password: An attacker on your local network could skip the router login without a password.
An A-rated alternative is shown below.
We'll email you if a new vulnerability hits your TP-Link Archer AX73. One email per incident. No spam.
- CISA Advisory AA23-144A · 2023 ↗
- CVE-2023-39781 · NVD · 2023 ↗
- FCC Equipment Authorization Database ↗
- FCC Covered List · National Security Designation ↗

