By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Banning routers won’t fix what’s already broken | Computer Weekly
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Banning routers won’t fix what’s already broken | Computer Weekly
News

Banning routers won’t fix what’s already broken | Computer Weekly

News Room
Last updated: 2026/03/31 at 10:01 AM
News Room Published 31 March 2026
Share
Banning routers won’t fix what’s already broken | Computer Weekly
SHARE

The US decision to add foreign-made consumer routers to the FCC’s Covered List has sparked predictable debate about supply chains, geopolitics and trust. Those are valid concerns. But if we are honest about where risk actually sits today, the truth is that the ban addresses tomorrow’s procurement decisions far more than today’s security exposure.

That matters, because attackers are not waiting for procurement cycles.

Routers have quietly become one of the most attractive footholds in both enterprise and home networks. They sit at the edge, are often internet-facing and frequently overlooked once deployed. In our own research, routers consistently rank among the riskiest devices, with high vulnerability density and a growing role in real-world exploitation.

Whereas the FCC decision focuses on where a device is made, the problem organisations need to deal with is how those devices are built, managed and maintained.

“Made in” is not the same as “secure” – it’s not even close.

Many of the weaknesses we see come from familiar, measurable issues like outdated software components, slow patching cycles, weak credentials, exposed management interfaces and long lifespans that extend well beyond vendor support. In firmware analysis, we regularly see common components that are years behind current versions, carrying known vulnerabilities that attackers can and do exploit.

And crucially, none of that changes because a new device is banned from import.

The bigger blind spot in this conversation is the installed base. Millions of routers already sit in homes, branch offices and remote worker environments. They will remain there for years. They are rarely patched or monitored and hybrid working has made them part of the enterprise attack surface whether organisations like it or not. A compromised home router can be used for traffic interception, credential harvesting, or as a pivot point into corporate systems.

So while the ban may reduce future exposure in a narrow sense, it does nothing to address the risk organisations already carry today, which will inevitably extend into the future.

There is also a risk that policy discussions drift into a false sense of progress. Focusing on supplier origin can create the impression that risk is being reduced at a structural level, when in reality the underlying issues remain unchanged. Security is not something you import. It is something you continuously verify.

Network infrastructure needs to be treated as part of the active attack surface, not background plumbing. That means maintaining an accurate inventory of routers across enterprise and remote environments, including firmware versions and exposure. Lifecycle management should also be prioritised and that means replacing end-of-life devices, enforcing firmware updates and demanding transparency from vendors around software components as well as patch cadence.

In order to remove easy wins for attackers, disable internet-exposed management interfaces, enforce unique credentials and apply segmentation so that one compromised router does not automatically lead to broader access.

Finally, recognise that the FCC decision raises important questions about trust and resilience in technology supply chains, but if it leads organisations to believe the problem has been dealt with, it risks becoming a distraction. The real work is less visible, less political and far more operational. It is about fixing the conditions that make routers such an easy and persistent target in the first place.

And that work is long overdue.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Mary Jo Foley: What the heck is going on with Microsoft lately? Mary Jo Foley: What the heck is going on with Microsoft lately?
Next Article AirDrop support is coming to older Galaxy S phones AirDrop support is coming to older Galaxy S phones
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

How to Improve Your Debounce and Get It to Stop Lying to You | HackerNoon
How to Improve Your Debounce and Get It to Stop Lying to You | HackerNoon
Computing
T-Mobile closes popular  fee loophole when purchasing through Apple
T-Mobile closes popular $35 fee loophole when purchasing through Apple
News
Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains
Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains
Computing
Bluesky announces AI app, Attie, for custom feeds
Bluesky announces AI app, Attie, for custom feeds
Software

You Might also Like

T-Mobile closes popular  fee loophole when purchasing through Apple
News

T-Mobile closes popular $35 fee loophole when purchasing through Apple

2 Min Read
5 Bizarre 3D Printing Projects Actually Worth Doing – BGR
News

5 Bizarre 3D Printing Projects Actually Worth Doing – BGR

9 Min Read
Including online games in social media bans is unworkable, unnecessary and would harm young people
News

Including online games in social media bans is unworkable, unnecessary and would harm young people

7 Min Read
Sony’s WH-1000XM5 headphones are a whopping 39 percent off
News

Sony’s WH-1000XM5 headphones are a whopping 39 percent off

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?