FCC Bans Import of Foreign-Made Consumer Routers Over Supply Chain Risks
All new overseas-manufactured routers prohibited from U.S. market after Volt Typhoon and Salt Typhoon exploited compromised devices. Existing routers unaffected.
The Federal Communications Commission has ordered a ban on importing new consumer-grade routers manufactured outside the United States, citing national security risks. The decision, announced March 24, 2026, adds all foreign-produced consumer routers to the FCC's Covered List, blocking their marketing and sale in the U.S.
FCC Chairman Brendan Carr pointed to documented exploitation of foreign-made routers by state-sponsored threat actors, including the Chinese-linked Volt Typhoon and Salt Typhoon campaigns that targeted U.S. critical infrastructure.
What's Banned
New models of consumer-grade routers manufactured in foreign countries can no longer receive FCC authorization for import or sale. The ban takes effect immediately.
Previously approved router models already in retail circulation may continue to be sold until existing inventory is depleted. Consumers can keep using any router they currently own—the ban applies only to new certifications and imports going forward.
Manufacturers can apply for Conditional Approval through the Department of War or Department of Homeland Security if they can demonstrate their products don't pose security risks. Starlink Wi-Fi routers, manufactured in Texas, are exempt.
Why Now
The decision follows years of warnings about router security and mounting evidence that compromised consumer networking equipment enables sophisticated attacks. The FCC cited two categories of risk:
Supply chain vulnerability: Foreign-manufactured routers could contain firmware backdoors, undocumented access mechanisms, or components that enable surveillance or disruption.
Cybersecurity threat: State and non-state actors have already exploited consumer routers for espionage, network disruption, credential theft, and botnet operations.
The Volt Typhoon campaign, attributed to Chinese state-sponsored actors, specifically targeted small office and home office routers as pivot points into critical infrastructure networks. Salt Typhoon's operations against telecom infrastructure similarly demonstrated how compromised networking equipment provides strategic access.
Industry Impact
The ban will significantly affect the consumer router market, where overseas manufacturing has long dominated due to cost advantages. Major brands that manufacture abroad will need to either relocate production or seek case-by-case exemptions.
Consumer prices will likely rise as the supply of certified devices shrinks. Organizations should anticipate longer lead times for bulk router purchases and may want to stockpile approved models before current inventory sells through.
For enterprises, the ban reinforces the broader trend toward supply chain security scrutiny. If consumer routers face import restrictions, enterprise networking equipment from foreign manufacturers may face similar pressure.
What Organizations Should Do
- Audit your router inventory — Identify devices by manufacturer and country of origin
- Plan replacement cycles — Factor in reduced availability of foreign-made options
- Review procurement policies — Establish criteria for approved networking equipment vendors
- Consider managed solutions — Enterprise-grade managed networking services may provide better security guarantees than consumer-grade hardware
The Bigger Picture
The FCC's decision represents the most significant supply chain security action targeting networking infrastructure since concerns about Huawei equipment emerged years ago. It signals a policy direction where national origin increasingly matters for technology that handles sensitive data or enables critical communications.
Whether this approach meaningfully improves security depends on implementation. Domestic manufacturing doesn't automatically mean secure manufacturing, and determined adversaries have demonstrated ability to compromise supply chains regardless of geographic boundaries. But reducing exposure to products from adversary nations' manufacturing ecosystems closes one avenue of potential compromise.
For consumers concerned about router security, the fundamentals remain the same: keep firmware updated, disable unnecessary remote management features, use strong credentials, and follow basic network security hygiene. Where your router was manufactured matters less than whether you're running vulnerable firmware.
Related Articles
White House Unveils 2026 Cybersecurity Strategy Prioritizing Offense
New National Cybersecurity Strategy emphasizes offensive operations, deregulation, and emerging tech superiority. Six pillars outline federal cyber priorities through 2029.
Mar 8, 2026CISA's Pre-Ransomware Warning Program Loses Its Only Operator
David Stern, the sole employee running CISA's ransomware early warning initiative, resigned December 19 after being ordered to relocate. The program had sent 2,100+ alerts in 2024.
Dec 24, 2025RedLine Infostealer Developer Faces 50 Years After US Extradition
Armenian national Hambardzum Minasyan extradited to face charges for developing RedLine malware infrastructure. Follows 2024 international takedown operation.
Mar 27, 2026UK Sanctions Xinbi Marketplace Over $19B in Scam Laundering
Britain becomes the first country to sanction Xinbi, a Telegram-based crypto marketplace that processed $19.9 billion for pig butchering scams and North Korean hackers.
Mar 26, 2026