If you own an old TP-Link router, you might receive an email from your internet service provider, urging you to secure it. Spectrum is notifying US customers about Russian spies exploiting vulnerable TP-Link routers to conduct hacking activities.
According to a Reddit post from the company and a spokesperson, the Spectrum emails are legit and are part of the FBI’s effort to crack down on Russian hackers abusing 23 TP-Link router models. Federal investigators indicated they were working with ISPs to notify owners of the affected routers, so it’s possible that more broadband providers will issue their own warnings.
(Credit: Spectrum)
The only problem is that addressing might require people to throw away their TP-Link routers altogether. “If your router is over 5 years old, consider replacing it,” Spectrum says in the email.
The message also suggests the routers can be patched with new firmware. But if you visit TP-Link’s page about the hacking threat, the company still notes: “All the affected products have reached End-of-Life (EOL) status and [are] no longer within TP-Link’s standard maintenance lifecycle.” Another company page describes the devices as “legacy” products that reached the end-of-life status “several years ago.”
That said, TP-Link notes that it had released earlier firmware updates for a handful of models to protect them against the threat, which involves a vulnerability called CVE-2023-50224, disclosed two years ago. The flaw has enabled Russian state-sponsored hackers to tamper with routers, redirecting internet traffic to malicious web pages to steal passwords and login credentials.
The list of affected products and whether they remain unpatched or can receive a partial fix. (Credit: TP-Link)
Still, even if the new firmware is loaded, TP-Link describes the fix as “partially patched” because the eligible products remain end-of-life, meaning they can’t receive updates to fix other software flaws. The company adds, “If you own one of the affected models, the most effective step you can take is to replace the device with one that is currently supported and receiving regular security updates. All routers, like any internet-facing device, have a security lifespan, which is true regardless of the manufacturer. Utilizing end-of-life networking equipment carries a real risk because vulnerabilities that emerge after support ends cannot always be patched.”
It’s not exactly an economical solution, and underscores the difficulties of addressing router vulnerabilities when there are no rebates or subsidies to help consumers switch to newer hardware. But there is some good news for affected users. To disrupt the threat, the FBI used a court-authorized operation to “to harden compromised routers across the United States,” which involved removing Russian access and cutting off the exploit vector.
(Credit: DOJ)
The result is an FBI-imposed patch. But the Justice Department notes the fix can still be reversed “through factory resets with hardware reset buttons. Legitimate users can also reverse changes by logging into web management pages and restoring desired settings (e.g., factory default settings).”
Still, the FBI’s patch won’t protect against other vulnerabilities, even as US cyber authorities have also been warning about Chinese hackers exploiting flaws in home office routers. To keep the end-of-life routers alive, one Reddit user resorted to installing the Linux-based open-source software, OpenWRT, on their device. But it’s best suited for more tech-savvy users.
In the meantime, the White House and the FCC have banned the sale of future foreign-made Wi-Fi routers to prevent hackers from exploiting the networking devices. Existing consumer Wi-Fi models remain legal. So you can still buy a new one. However, the current ban quietly slaps an alarming condition that’ll block companies from issuing software updates to all foreign-made Wi-Fi routers starting on March 1, 2027. That said, the FCC has indicated it’ll clarify the policy and even extend the deadline.
For now, a few US companies, including Netgear and Amazon’s eero, have also received temporary exemptions from the ban. TP-Link is applying for an exemption, but it’s unclear whether it’ll receive one.
About Our Expert
Michael Kan
Principal Reporter
Experience
I’ve been a journalist for over 15 years. I got my start as a schools and cities reporter in Kansas City and joined PCMag in 2017, where I cover satellite internet services, cybersecurity, PC hardware, and more. I’m currently based in San Francisco, but previously spent over five years in China, covering the country’s technology sector.
Since 2020, I’ve covered the launch and explosive growth of SpaceX’s Starlink satellite internet service, writing 600+ stories on availability and feature launches, but also the regulatory battles over the expansion of satellite constellations, fights with rival providers like AST SpaceMobile and Amazon, and the effort to expand into satellite-based mobile service. I’ve combed through FCC filings for the latest news and driven to remote corners of California to test Starlink’s cellular service.
I also cover cyber threats, from ransomware gangs to the emergence of AI-based malware. In 2024 and 2025, the FTC forced Avast to pay consumers $16.5 million for secretly harvesting and selling their personal information to third-party clients, as revealed in my joint investigation with Motherboard.
I also cover the PC graphics card market. Pandemic-era shortages led me to camp out in front of a Best Buy to get an RTX 3000. I’m now following how the AI-driven memory shortage is impacting the entire consumer electronics market. I’m always eager to learn more, so please jump in the comments with feedback and send me tips.
Read Full Bio


