Over 100 Wi-Fi routers fail major security test — protect yourself now

'Matrix'-like green numbers flowing vertically over image of home Wi-Fi router.
(Image credit: Syafiq Adnan/Shutterstock)

Almost all home Wi-Fi routers tested in a mass study by Germany's renowned Fraunhofer Institute had serious security vulnerabilities that could easily be fixed by router makers, a recently released report states.

"Nearly all were found to have security flaws, some of them very severe," the Fraunhofer Institute said in a press release. "The problems range from missing security updates to easily decrypted, hard-coded passwords and known vulnerabilities that should have been patched long ago." 

Using its own analytical software, the institute tested the most recently available firmware for 117 home Wi-Fi models currently sold in Europe, including routers from ASUS, D-Link, Linksys, Netgear, TP-Link, Zyxel and the small German brand AVM. The models themselves were not physically tested.

A full list of the tested models and firmware is on GitHub. The institute was not able to examine the firmware of 10 more models, mostly from Linksys. The report notes that many firmware updates are issued without fixing known flaws.

Because the study was begun in late March and examines the firmware available on March 27, it will not include the dozens of firmware hot fixes that Netgear issued in late June to correct a series of flaws. 

Meanwhile, Huawei routers were not examined because the company does not make its router firmware publicly available, and routers and gateways issued by ISPs were not examined because the ISPs outsource firmware development to many third parties.

It's not like this is the first survey of its kind. A separate study of router security delivered a similarly dire report in December 2018, yet little improvement has been seen in the subsequent 18 months.

How can you protect your router?

So what can you do? You can make sure that the next router you buy automatically installs firmware updates. You can check to see whether your current router does so, or makes it fairly easy to install firmware updates manually.

You should also make sure that the administrative password for your router has been changed from the factory default password. (Check the list of default passwords at https://www.routerpasswords.com.) You should also check its administrative interface to make sure that UPnP and remote access are disabled. 

And if your router was first released more than 5 years ago, consider buying a newer model unless it meets all of the above criteria. (Here are our picks for best Wi-Fi router.)

Alternatively, you could try to "flash" your older router to run more secure open-source router firmware such as OpenWrt, DD-WRT or Tomato.

The bad, and the worse

AVM came out by far the best among the seven manufacturers examined, although it was not without flaws. ASUS and Netgear did not do well, but they were less terrible than D-Link, Linksys, TP-Link and Zyxel.

The flaws included out-of-date firmware (the D-Link DSL-321B Z had not been updated since 2014); out-of-date Linux kernels (the Linksys WRT54GL uses a kernel from 2002); failure to implement common security techniques (AVM did better than the rest here); secret private keys embedded in the firmware so anyone could find them (the Netgear R6800 had 13); and hard-coded administrative usernames and passwords allowing full device takeover (only ASUS had none). 

"There is no router without flaws, and there is no vendor who does a perfect job regarding all security aspects," the Fraunhofer report concluded. "Much more effort is needed to make home routers as secure as current desktop or server systems." 

The routers you really shouldn't use

There are a few routers named in the study that you should definitely not use, even though it appears you still can buy them.

"The worst case regarding high severity CVEs [widely known flaws] is the Linksys WRT54GL powered by the oldest kernel found in our study," the report said, noting that this model uses the 2.4.20 kernel from 2002. "There are 579 high severity CVEs affecting this product."

That particular model last had its firmware updated in January 2016, one of the oldest firmwares in the study. The Linksys WRT54GL was first released in 2005 and is still sold today, even though it handles Wi-Fi protocols only up to 802.11g. 

However, the WRT54G series is possibly the best-selling family of Wi-Fi routers ever. The WRT54GL's continued appeal may be driven by a reputation for reliability and the fact that it's easily "flashed" to run open-source firmware -- the OpenWrt firmware was initially developed to run on this series of routers.

Popping the kernels

It's not that other models do so much better in running up-to-date Linux kernels. (More than 90% of the routers in the study ran Linux.) By far, the most common version of the Linux kernel was 2.6.36, issued in 2010. Only AVM didn't run any 2.x kernels, its oldest version being 3.10.10 from 2013.

"Nevertheless, more than half of the AVM devices run kernel versions that are not maintained anymore," noted the report.

Linux consistently builds new security features right into its kernel, and it's not that difficult to update the kernel on Linux devices. Makers of Linux PC and server distributions do it all the time.

While the most recent Linux kernel at the time of the Fraunhofer testing (March 27, 2020) was version 5.4, none of the routers tested used anything newer than 4.4.60, from 2016. (AVM and Netgear used that one.)

"Linux works continuously to close security vulnerabilities in its operating system and to develop new functionalities," said researcher Johannes vom Dorp in the Fraunhofer press release. "All the manufacturers would have to do is install the latest software, but they do not integrate it to the extent that they could and should." 

Everyone's got your private secret key

Another no-no model is the Netgear R6800, which as mentioned above had a whopping 13 hard-coded private security keys embedded in its firmware. 

Its last firmware update was in August 2019, and we'd not want to use it until a new one was made available. (That model wasn't part of the late-June series of Netgear hot fixes.)

Private keys are a crucial part of the mechanisms governing internet security, and routers would use them to initiate secure transmissions and verify firmware updates. They need to stay closely guarded secrets to be effective, but that's pretty well undermined if the keys can be found in a router's firmware. 

"This means any attacker can impersonate the device and do man-in-the-middle attacks," the report said. "These keys are shared with all devices of the same model.  This means one private key published in a firmware puts thousands of devices in danger."

Only AVM had zero private keys in all its firmware images. Netgear had the most.

Well out of date

Then there's the D-Link DSL-321B Z, which hadn't had a firmware update since August 2014. In total, 46 models hadn't received updates in more than a year, although most had within the previous two years. 

"If a vendor did not update a firmware in a long time, it is for sure that there are several known vulnerabilities in the device," the report said. "The other way round is not necessarily true."

In terms of available security protections, which are too technical to discuss here, AVM was far and away the best at deploying them on its devices, with Netgear a distant second. D-Link fared worst. 

But again, most of these protections are standard on Linux PCs and servers, and even on Android phones. There's no real good reason they can't be used on more routers.

TOPICS
Paul Wagenseil

Paul Wagenseil is a senior editor at Tom's Guide focused on security and privacy. He has also been a dishwasher, fry cook, long-haul driver, code monkey and video editor. He's been rooting around in the information-security space for more than 15 years at FoxNews.com, SecurityNewsDaily, TechNewsDaily and Tom's Guide, has presented talks at the ShmooCon, DerbyCon and BSides Las Vegas hacker conferences, shown up in random TV news spots and even moderated a panel discussion at the CEDIA home-technology conference. You can follow his rants on Twitter at @snd_wagenseil.

Read more
Graphic of fibre optic cables attacking code
An estimated 46,000 VPN servers are vulnerable to being hijacked
TP- Link Archer AX55 sitting on desk
Best Wi-Fi routers for 2025: Tested and rated
Best Wi-Fi 7 routers
Best Wi-Fi 7 routers of 2025: The future of Wi-Fi is here
A Wi-Fi router next to a phone with a lock symbol on the screen
Massive MikroTik router botnet has been spreading malware – here’s how to stay safe
TP-Link Archer GE800 on desk in living room
Best gaming routers of 2025
TP-Link Deco XE75 on desk
The best Wi-Fi 6 routers of 2025
Latest in Routers
The eero Pro 7 next to the eero Max 7 on a desk
Eero Pro 7 vs Eero Max 7: Which Wi-Fi 7-powered eero mesh system should you buy?
Eero Pro 7 sitting on counter
Eero Pro 7 review: Fast Wi-Fi 7 mesh speeds simplified
Netgear Orbi 873 on desk
Netgear Orbi 870 review: A great Wi-Fi 7 mesh kit for long range performance
TP-Link's Deco BE65-Outdoor Wi-Fi 7 mesh node mounted to a pole at CES 2025
TP-Link’s new outdoor mesh extender will give you true Wi-Fi 7 speeds right in your backyard
The MSI Roammii BE Lite dual-band mesh Wi-Fi 7 router on a table
Upgrading to Wi-Fi 7 is about to get more complicated — and these new routers are to blame
TP- Link Archer AX55 sitting on desk
This Chinese router company with 65% market share in the US could be banned — what you need to know
Latest in News
Apple Watch Series 10
Future Apple Watch models could get a surprising new feature — what we know
iPhone 16 Pro vs iPhone 16 Pro Max in hand showing displays
Forget iPhone 17 — iPhone 18 could get this huge upgrade
The new Husqvarna iQ series robot lawn mower.
Husqvarna’s new robot mowers offer GPS for less
Rendered images of rumored foldable iPhone.
Foldable iPhone report just revealed key details — here's what we know
NYTimes Connections
NYT Connections today hints and answers — Sunday, March 23 (#651)
NYT Strands on a cellphone
NYT Strands today — hints, spangram and answers for game #385 (Sunday, March 23 2025)
  • CometKepler
    Good article. But the Tom’s reviews of routers have still not made checking security a serious criteria for recommendations. Other guidelines such as the https://routersecurity.org/ site offer good recommendations on what to consider. Do the routers dial home and disclose what data they collect? How often is the firmware updated and supported? Etc.
    Reply