By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Should You Replace Your TP-Link Router? We Asked 4 Cybersecurity Experts to Weigh In
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Should You Replace Your TP-Link Router? We Asked 4 Cybersecurity Experts to Weigh In
News

Should You Replace Your TP-Link Router? We Asked 4 Cybersecurity Experts to Weigh In

News Room
Last updated: 2025/03/14 at 10:54 PM
News Room Published 14 March 2025
Share
SHARE

It’s not every day a humble Wi-Fi router makes an appearance in the halls of Congress. But that’s exactly what happened on March 5 when Rep. Raja Krishnamoorthi, a Democrat from Illinois, held up a TP-Link router and said, “Don’t use this.”

Krishnamoorthi has been urging a ban of the routers for months in response to several China-backed cyberattacks last year. Investigators at the Commerce, Defense and Justice departments all opened probes into TP-Link routers in 2024 due to ties to Chinese cyberattacks.

These departments are weighing a potential ban on the sale of TP-Link routers, The Wall Street Journal reported in December. Along with Rep. John Moolenaar, a Republican from Michigan, Krishnamoorthi spurred the investigation over the summer with a letter to the Department of Commerce calling for an immediate ban.

A potential ban is more about the company’s links to China than specific security issues that have been publicly identified, according to cybersecurity researchers I spoke with. 

TP-Link was founded in 1996 by brothers Zhao Jianjun and Zhao Jiaxing in Shenzhen, China. In October last year, it moved its headquarters to Irvine, California, two months after the House announced an investigation into the company. The company told it had previously operated dual headquarters, in Singapore and Irvine.

In the House’s Select Committee on China hearing, Rob Joyce, former director of cybersecurity at the National Security Agency, also told the committee that TP-Link routers are a threat to US cybersecurity.

“We need to all take action and replace those devices so they don’t become the tools that are used in the attacks on the US,” Joyce said.

In a statement to , TP-Link President Jeff Barney said, “Witnesses at the hearing didn’t present a shred of evidence that TP-Link is linked to the Chinese government and we are not.”

TP-Link has become increasingly dominant in the US router market since the pandemic. According to the Journal report, it grew from 20% of total router sales in 2019 to around 65% this year. TP-Link disputed these numbers to , and a separate analysis from the IT platform Lansweeper found that 12% of home routers currently used in the US are made by TP-Link. 

“People expect there to be some smoking gun or something in these devices from Chinese manufacturers, and what you end up finding is the exact same problems in every device. It’s not like the Chinese devices are glaringly insecure,” Thomas Pace, CEO of cybersecurity firm NetRise and a former security contractor for the Department of Energy, told . “That’s not the risk. The risk is in the corporate structure of every Chinese company.”

Watch this: Best Wi-Fi Routers for 2025: A Buying Guide

06:14

In my conversations with TP-Link representatives, they’ve repeatedly distanced themselves from ties to China. 

“TP-Link has a secure, vertically integrated and US-owned international supply chain,” a TP-Link representative told . “Nearly all products sold in the United States are manufactured in Vietnam.”

Even so, the US government appears to see TP-Link as a Chinese entity. In August, the House Select Committee urged an investigation into the company. 

“TP-Link’s unusual degree of vulnerabilities and required compliance with [Chinese] law are in and of themselves disconcerting,” the lawmakers wrote. “When combined with the [Chinese] government’s common use of [home office] routers like TP-Link to perpetrate extensive cyberattacks in the United States, it becomes significantly alarming.”

Asked for comment, a TP-Link representative told , “Like many consumer electronics brands, TP-Link Systems’ routers have been identified as potential targets for hackers. However, there is no evidence to suggest our products are more vulnerable than those of other brands.”

has several TP-Link models on our lists of the best Wi-Fi routers and will monitor this story closely to see if we need to reevaluate those choices. Though our evaluation of the hardware hasn’t changed, we’re pausing TP-Link routers as our top recommendation until we learn more.

two TP-Link Deco 5 routers with a neon sign behind

Chris Monroe/

A ban is more about TP-Link’s ties to China than a known technical issue

The cybersecurity experts I spoke with all agreed that TP-Link had security flaws, but so do all router companies. It’s unclear whether the government has found a new issue that would lead to a potential ban on TP-Link sales.

The Wall Street Journal article cited federal contracting documents that show TP-Link routers purchased by agencies from the National Aeronautics and Space Administration to the Defense Department and Drug Enforcement Administration.

The potential ban comes at a time in Washington when there is growing bipartisan support for extracting Chinese products from US telecommunications. In an attack revealed in October dubbed Salt Typhoon, Chinese hackers reportedly broke into the networks of US internet providers like AT&T, Verizon and Lumen, which owns CenturyLink and Quantum Fiber.

“Vulnerabilities in embedded devices are not unique to any one manufacturer or country of origin,” said Sonu Shankar, chief product officer at Phosphorus Cybersecurity. “Nation-state actors frequently exploit weaknesses in devices from vendors worldwide, including those sold by American manufacturers.”

Brendan Carr, Trump’s pick for Federal Communications Commission chairman, said in an interview with CNBC that a recent intelligence briefing on the Salt Typhoon attack “made me want to basically smash my phone at the end of it.”

“In many ways, the horse is out of the barn at this point,” Carr said. “And we need all hands on deck to try to address this and rein this in.”

TP-Link hasn’t been linked to the Salt Typhoon attacks, but it does show the current temperature for perceived threats from China. 

Two Deco mesh routers with a plant behind

Chris Monroe/

The government may have identified a TP-Link vulnerability, but we don’t know for sure

Several of the cybersecurity experts I spoke with believe it’s likely that intelligence agencies have found something with TP-Link that warrants a ban. 

“I think this comes from a deeper intelligence within the US government. Usually this happens before the information becomes public,” Guido Patanella, senior vice president of engineering at Lansweeper, told .

“I think it’s beyond political,” Patanella added. “It could be either an intentionally set hardware flaw or it could be from a firmware point of view. This is usually a black box analysis and it usually doesn’t get shared, as happened with Huawei.”

In 2019, Trump issued an executive order that effectively banned US companies from using network equipment from Huawei, another Chinese company that came under fire over national security concerns. 

Pace, the NetRise CEO, told me he thinks it’s likely that there’s a “zero-day” vulnerability in TP-Link devices — a term that refers to a hidden flaw in which there have been zero days to fix it — but he was quick to point out that there’s no evidence to back that up. 

“But at least that claim is based in some sort of reality that we are aware of that exists, which is that the PRC (People’s Republic of China) is involved in every Chinese corporation. And that’s undeniable,” Pace said.

archer-ax1500-lifestyle-02-72ppi

TP-Link

TP-Link has known security flaws, but so do all router companies

A TP-Link representative pointed us to the Cybersecurity and Infrastructure Security Agency’s list of Known Exploited Vulnerabilities. TP-Link has two of these events catalogued, compared to eight for Netgear and 20 for D-Link; other popular router brands like Asus, Linksys and Eero have none. 

By this measure, TP-Link isn’t exceptional in either direction, but that might not be all that useful of a measure.

“We’ve analyzed an astonishing amount of TP-Link firmware. We find stuff, but we find stuff in everything,” said Thomas Pace, CEO of cybersecurity firm NetRise and former security contractor for the Department of Energy.

“The problem with the CISA KEV [list] is, if everything’s on the list, how good is that list?” Pace added. “Basically, every telecommunications device on the planet has at least one vulnerability on the CISA KEV. It’s a big problem that there are not great answers to.”

There have also been several cybersecurity reports that have singled out TP-Link specifically. The most high-profile one came in October when Microsoft released details on a password spraying attack it had been tracking for over a year. In this type of attack, hackers use a single common password to access multiple accounts. 

Microsoft referred to the attack as “nation-state threat actor activity” and said TP-Link made up most of the routers used.

In May 2023, Check Point Research also identified a firmware implant in TP-Link routers linked to a Chinese state-sponsored hacking group. In this case, the campaign targeted European foreign affairs entities. Still, the researchers emphasized that the attack was written in a “firmware-agnostic manner” and wasn’t designed to exploit TP-Link specifically. 

“While our analysis focused on its presence in modified TP-Link firmware, previous incidents show that similar implants and backdoors have been used on devices from diverse manufacturers, including US based,” Itay Cohen, one of the authors of the Check Point Research report, told .   

“The broader implication is that this implant isn’t about targeting a specific brand — it’s part of a larger strategy to exploit systemic vulnerabilities in internet infrastructure.”

Cohen said he doesn’t believe a TP-Link ban would improve security much. As I heard from other researchers, the security issues that have been identified are not unique to one company. 

“The vulnerabilities and risks associated with routers are largely systemic and apply to a wide range of brands, including those manufactured in the US,” Cohen said. “We don’t believe that the implant we found was known to TP-Link or was knowingly inserted as a backdoor to their products.”

two TP Link Deco X90 Wi-Fi 6 routers

Chris Monroe/

Is it safe to use a TP-Link router?

There are real risks associated with using a TP-Link router, but some level of risk is present no matter what brand of router you use. In general, cyberattacks tied to Chinese actors have targeted think tanks, government organizations, nongovernment organizations and Defense Department suppliers, according to the Journal’s reporting. 

“I don’t think that the average person is going to have this massive target on their back,” Pace told . “They tend to go after the things they want to go after.”

That said, these kinds of attacks are often indiscriminate, with the goal of creating a chain of nodes between infected routers and hackers. 

“This means regular users are at risk of being targeted as part of a broader attack campaign, even if they are not individually targeted,” said Cohen, the Check Point Security researcher. 

How to protect yourself if you have a TP-Link router

To keep your network safe and secure, you should follow the same steps whether you have a TP-Link router or any other brand. Here’s what experts recommend:

  • Keep your firmware updated: One of the most common ways hackers access your network is through outdated firmware. TP-Link told us that customers with TP-Link Cloud accounts can simply click the “Check for Updates” button in their product’s firmware menu when logged into the TP-Link app or website. You can also find the latest updates in TP-Link’s download center. 
  • Strengthen your credentials: If you’ve never changed the default login credentials on your router, now’s the time to do it. Weak passwords are the cause of many common attacks. “Devices using default or weak passwords are easy targets,” Cohen told . “Default or simple passwords can be easily brute-forced or guessed.” Most routers have an app that lets you update your login credentials from there, but you can also type your router’s IP address into a URL. These credentials are different from your Wi-Fi name and password, which should also be changed every six months or so. The longer and more random the password, the better. 
  • Consider using a VPN service: For an added layer of protection, a virtual private network will encrypt all of your internet traffic and prevent your internet provider (or anyone else) from tracking the websites or apps you’re using. You can find ’s picks for the best VPN services here. 
  • You have router choices: In ‘s testing, TP-Link routers have consistently ranked as some of the top-performing routers to choose from. If you are in the market for a new router but feeling extra cautious, names a few other great options to choose from here.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article You need a new mattress but don’t have the budget — is a new topper worth buying this World Sleep Day instead?
Next Article Create A Lightning Text Effect Using HTML And CSS Using This Simple Code | HackerNoon
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Code Smell 299 – How to Fix Overloaded Test Setups | HackerNoon
Computing
How to enable Android 16’s Audio Sharing feature on your Pixel
News
Australia has been hesitant – but could robots soon be delivering your pizza?
News
Alibaba to provide wholesale power to Mongolian consumers in latest expansion · TechNode
Computing

You Might also Like

News

How to enable Android 16’s Audio Sharing feature on your Pixel

6 Min Read
News

Australia has been hesitant – but could robots soon be delivering your pizza?

10 Min Read
News

Zara Tindall opens up about ‘struggles’ in Royal Family and how they cope

2 Min Read
News

How innocent people could be jailed because of ChatGPT and leave criminals free

12 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?