Country that put backdoors into Cisco routers to spy on world bans foreign routers
Summary
The Federal Communications Commission (FCC) has added all foreign-made consumer routers to its Covered List under the Secure Networks Act, effectively blocking approval of any new consumer-grade routers manufactured abroad. The change aims to mitigate national security and supply-chain risks, although it does not prohibit the import, sale or use of models already authorised by the FCC.
The decision follows a White House-convened interagency determination that foreign-produced routers pose an unacceptable risk to US national security, citing past exploitation of router flaws in major cyber campaigns. There is an exemption route: manufacturers can seek Conditional Approval from the Department of Defense or DHS, and apply to the FCC for a waiver.
Key Points
- The FCC added foreign-produced consumer routers to the Covered List, meaning no new approvals for such devices.
- Existing authorised routers can still be imported, sold and used; the ban targets new approvals only.
- Rationale: national security and supply-chain vulnerabilities could allow disruption of critical infrastructure or espionage.
- The rule is politically charged — it aligns with a push to reduce dependency on foreign-made core components.
- Practically, most consumer routers are manufactured overseas, so the change limits available options; Starlink’s newer router is a noted US-made exception.
- Exemptions exist via Conditional Approval from DoD/DHS and subsequent FCC approval, but getting such clearance is non-trivial.
Content summary
The FCC’s move is preventive: rather than responding to a single exploit, regulators are treating the entire class of foreign-made consumer routers as a potential vector for nation-state compromise. The agency referenced prior cyberattacks that leveraged router vulnerabilities and framed the action as consistent with the administration’s National Security Strategy to avoid dependence on foreign suppliers for critical components.
Industry reaction is mixed — commentators warn of supply issues and higher costs because few manufacturers can pivot production to the US quickly. The policy also carries a sting of irony, given historical incidents where US agencies tampered with Cisco routers in transit to install surveillance tools.
Context and relevance
This policy sits at the intersection of cybersecurity, industrial policy and geopolitics. For network managers, consumers and vendors it changes procurement calculus: new consumer router models from outside the US won’t get FCC sign-off unless they secure specific government exemptions. For manufacturers it raises the bar for market access and may push investment into domestic production or redesign of approval paths.
In broader terms, expect this to accelerate debates over supply-chain resilience, onshoring of telecom hardware, and whether blanket restrictions are an effective or proportionate way to manage cyber risk.
Why should I read this?
Short version: if you buy or sell routers, this matters. The FCC just shut the door on new foreign-made consumer routers unless they clear a tricky exemption route. That means fewer choices, potential price bumps, and a real chance that consumer networking kit stays the same for longer while manufacturers decide whether to build in the US. Also — the policy has a fair bit of political theatre baked in, so the details on exemptions and what counts as “existing” kit are worth a quick skim.
Author style
Punchy. The piece flags a big regulatory shift and its practical fallout — not just a policy press release. If you care about network security, procurement or the future of hardware supply chains, read the detail; it’s where the practical implications live.
Source
Source: https://go.theregister.com/feed/www.theregister.com/2026/03/24/fcc_foreign_routers/
