Why Your Router Is the Most Hackable Device at Home
Routers are the most vulnerable devices on home and business networks, yet most users never update their firmware or change default passwords. Here's how attackers exploit them and what you can do.
The Forgotten Gateway
Every device in your home connects to the internet through one box: your router. It handles banking sessions, video calls, smart-home commands, and work emails. Yet most people treat it like a piece of furniture — plugged in once, then ignored for years. That neglect makes routers the single riskiest device category on modern networks, according to cybersecurity researchers and law enforcement agencies alike.
Routers Top the Risk Charts
Cybersecurity firm Forescout publishes an annual ranking of the most vulnerable connected devices across IT, IoT, operational technology, and medical environments. In its 2026 report, routers once again claimed the top spot among IT assets, carrying an average of 32 known vulnerabilities per device. Network infrastructure now surpasses traditional endpoints like laptops and desktops in overall risk — a shift that caught even seasoned analysts off guard.
The problem cuts across industries. Financial services records the highest average device risk, followed by government and healthcare. Legacy operating systems compound the issue: nearly 35 percent of healthcare devices and 29 percent of financial-services devices still run outdated versions of Windows that no longer receive security patches.
Why Routers Are So Vulnerable
Several factors make routers uniquely attractive to attackers:
- Default credentials. Many routers ship with factory-set usernames and passwords like "admin/admin." Research from Avast found that 72 percent of users have never updated their router's firmware, and 51 percent have never even logged into the administration page.
- Always-on exposure. Unlike a laptop that sleeps, a router faces the open internet around the clock, making it a persistent target for automated scanning tools.
- Rare patches. Manufacturers often stop issuing firmware updates long before a router physically dies. Once a model reaches "end of life," known vulnerabilities remain permanently unpatched.
- Built-in backdoors. Some vendors include remote management features for support purposes. When poorly secured, these become ready-made entry points for attackers.
How Attackers Exploit Compromised Routers
A hijacked router gives an attacker extraordinary leverage. Because all network traffic flows through it, a compromised device can redirect users to phishing sites, intercept unencrypted data, or inject malicious code into downloads — all without the user noticing anything unusual.
The most common outcome, however, is botnet recruitment. Malware such as KadNap and Anyproxy silently enroll routers into vast networks of compromised devices. Criminals then rent access to these botnets, using them to launch distributed denial-of-service (DDoS) attacks, conduct credential-stuffing campaigns, or route illicit traffic through seemingly legitimate residential IP addresses.
In May 2025, the FBI issued a formal alert warning that end-of-life routers from brands like Linksys were being actively targeted by cybercriminal proxy services. The bureau identified specific models — including the E1200, E2500, and E4200 — running malware that persisted even through reboots.
How to Protect Yourself
Securing a router does not require technical expertise. A few steps dramatically reduce risk:
- Change default credentials immediately after setup. Use a unique password of at least 16 characters.
- Update firmware regularly. Most modern routers offer automatic updates — enable them.
- Disable remote management unless you specifically need it. This closes one of the most exploited attack vectors.
- Replace end-of-life hardware. If the manufacturer no longer issues updates, no amount of configuration can keep the device safe.
- Check connected devices periodically through the router's admin panel to spot unauthorized connections.
The Bigger Picture
As homes fill with smart speakers, cameras, thermostats, and appliances, the router becomes an ever more critical chokepoint. Forescout's 2026 data shows that 40 percent of today's riskiest device types were not even on the list a year ago — a sign that the attack surface is expanding faster than defenses can keep up. Keeping the router secure is no longer optional; it is the foundation on which every other device's safety depends.