Buyer's Guide

Your Router Is Probably Not Protecting You Enough

Published March 27, 2026 · Last reviewed March 31, 2026 · 6 min read · ismyroutersafe.com Editorial

Premium WiFi mesh router
In this article
  1. How urgent is your situation?
  2. When replacement is critical
  3. What the highest protection actually looks like
  4. Routers that meet the bar
  5. Good routers - and why good isn't enough
  6. Special case: ISP gateways
Our honest point of view: Every router we've analyzed has security gaps - some catastrophic, some modest. Our position is that the right standard isn't "safe enough." It's the highest protection you can reasonably have. That's what this guide is built around.

How urgent is your situation?

The right question isn't whether to upgrade - it's how fast you need to move. Security is a spectrum, not a binary. Every home network deserves the strongest protection available. The situations below determine whether your timeline is days, months, or simply "when it makes sense." But in every case, the destination is the same: a router built for real security, not one that happens to have an acceptable patch record.

Your situationAction
TP-Link router in active useReplace - critical. CISA Volt Typhoon advisory, active federal investigation, documented attack vector. Do not wait.
Any router at end-of-life (no more patches)Replace - critical. An unpatched router is a permanently open door. Every day you wait, the exposure compounds.
Tenda or Huawei routerReplace - critical. Documented backdoors (Tenda) or fully banned from the US market (Huawei). These are not routers worth maintaining.
ISP gateway (Xfinity, AT&T, Verizon, Spectrum)Secure now - upgrade when ready. Take immediate steps to harden what you have. Add a dedicated security-focused router behind it as soon as feasible for true control.
Older Netgear in active supportMaintain - plan your upgrade. Still receiving patches, but Netgear's support history is uneven. The ceiling on protection here is lower than you deserve.
Current-generation Asus, Eero, Google Nest, LinksysSolid hardware - consider your ceiling. These are good routers. But "good" means you're not in crisis - it doesn't mean you have the highest available protection. Upgrade when you're ready to take security seriously.
Router over 5 years old (any brand)Replace promptly. Age alone puts hardware near or past end-of-life. Modern security standards require modern hardware.

When replacement is critical

1. End-of-life routers

This is the single most important replacement trigger, regardless of manufacturer. When a router reaches end-of-life, the manufacturer permanently stops issuing security patches. Any vulnerability found after that date will never be fixed - the router's security profile is frozen in time, and gets worse as new vulnerabilities are discovered. There is no amount of configuration or hygiene that compensates for a router with no one patching it.

Key end-of-life models to replace immediately: TP-Link Archer C7, Netgear Nighthawk R7000, Linksys EA9500, D-Link DIR-842, Apple AirPort Extreme, any Asus RT-N series.

2. TP-Link routers - all models

The CISA advisory (AA23-144A), the active DOJ/FCC investigation, and TP-Link's documented involvement in the Volt Typhoon campaign are all independent of any specific firmware version. Even a fully-updated TP-Link router carries structural risk from Chinese legal jurisdiction and an ongoing federal investigation. This is not about the hardware quality - it's about what the manufacturer is legally obligated to do under Chinese national intelligence law.

If your home network touches anything sensitive - work, banking, healthcare, children's devices - TP-Link is not an acceptable risk, regardless of model or firmware.

3. Tenda routers with documented backdoors

Tenda's AC23 has a documented backdoor vulnerability (CVE-2020-10987) rated 9.8/10 severity that was never properly patched. This is in a categorically different situation from ordinary CVEs - it's a deliberately-designed or negligently-maintained back door in hardware that's still in homes today. There is no patch coming. The only solution is replacement.

What the highest protection actually looks like

Most routers are designed to connect you to the internet. The best security routers are designed to protect you while you're there. Those are different products solving different problems. Here's what separates genuinely protective hardware from hardware that merely meets the minimum bar:

What a security-first router provides
Always-on network-level VPN - encrypts your internet traffic at the router, not per-device. Every device on your network is protected automatically, including smart home devices that can't run VPN apps
Zero-Trust device isolation - devices on your network can't see or communicate with each other unless explicitly permitted. A compromised smart TV, for example, can't reach your laptop or NAS
Clean US jurisdiction, no intelligence law exposure - headquartered in the US, manufactured in Taiwan. Not subject to Chinese or Russian intelligence laws requiring backdoor access
Current FCC authorization - verifiable in the FCC Equipment Authorization Database, no Covered List designation
Automatic security updates - patches apply without requiring user action. The most dangerous vulnerabilities are the ones users never know about
WPA3 encryption - the current generation of Wi-Fi security. Significantly more resistant to offline password attacks and eavesdropping than WPA2
Dedicated security team with fast CVE response - the manufacturer treats security as the core product, not a feature added afterward

Routers that meet the bar

All of these models have current FCC authorization, active security patch support, and no Chinese ownership concerns. This list reflects what's available as of March 2026, ordered by the level of protection they provide:

Highest protection - security as the primary design goal

Strong hardware - serious protection, some gaps

Acceptable options - convenient, but privacy trade-offs

Budget options

A note on "US brand" routers: Netgear, Google, and Amazon/Eero are US-headquartered but manufacture their hardware primarily in Vietnam and Southeast Asia. Under the FCC ban's broad scope, their ability to release new models may be affected. Existing authorized models are currently fine to purchase, but the long-term supply picture is in flux. We'll update this guide as the Conditional Approval process develops.

Good routers - and why good isn't enough

If you have a current-generation Asus, Eero, Google Nest, or AT&T/Verizon ISP gateway, you're not in crisis. These are legitimately decent products with reasonable security records. We don't want to overstate the risk for hardware that's functioning and patched.

But here's our honest view: "no known problems" is a low bar. The routers above protect you from known threats - vulnerabilities that have already been discovered and patched. What they don't provide is defense-in-depth: the ability to isolate compromised devices, encrypt your entire network's traffic before it leaves your home, or give you meaningful control over what devices on your network can do.

If you're satisfied with your current router, the right actions are: ensure auto-updates are enabled, change all default passwords, and check our database periodically for new disclosures about your model. That's responsible security hygiene. When you're ready to stop accepting "adequate" and start expecting the highest protection available, the upgrade path is clear.

Special case: ISP gateways

ISP-provided gateways are a particular kind of compromise. Your ISP controls the firmware - you can't install security updates yourself, and advanced security settings are often locked or unavailable. You're trusting your carrier's security posture, not your own.

Immediate steps if you're on an ISP gateway:

  1. Secure your ISP account with a strong unique password and 2-factor authentication. A compromised ISP account can give someone remote access to your gateway.
  2. Disable public Wi-Fi hotspot broadcasting immediately (especially on Xfinity gateways, which enable this by default - you're effectively sharing your physical network with strangers).
  3. Put the ISP gateway in bridge/passthrough mode and place a dedicated security router behind it. This is the only way to get real control over your network security while keeping your ISP service.
  4. Ask your ISP about hardware upgrades - many offer newer gateway hardware at no cost if you're on an older model.

An ISP gateway in bridge mode behind a security-first router gives you the best of both worlds: your ISP's service without handing them control of your network's security.

🔍
Not sure where your router stands? Check your specific model → for a full security report with score, grade, and verdict.

ismyroutersafe.com does not receive compensation from router manufacturers for recommendations. See our full disclosure policy at the methodology page.