Product Security

The FCC's Waiver Extension for Routers Is the Right Call for Cybersecurity

Why patch status matters more than where it’s assembled—and what device makers should take from the policy reversal.

Doc McConnell

Doc McConnell

Head of Policy and Compliance

May 19, 2026

On May 8, the FCC quietly averted a looming cybersecurity crisis. The Office of Engineering and Technology extended waivers for foreign-made consumer routers and drones already deployed in the United States, allowing them to continue receiving firmware and software updates until at least January 1, 2029. Without the extension, updates on these devices—including updates intended to close exploitable cybersecurity vulnerabilities—could have been blocked as early as 2027.

The purpose of placing foreign-made routers on the Covered List was to improve cybersecurity for US consumers. Had the FCC not made this change, it would have produced the opposite outcome: millions of edge devices in American homes, small businesses, and critical infrastructure, all still in service, with no path to receive a security patch. That's a much worse posture than the policy was trying to fix.

The reversal also validates something my colleagues at Finite State and I have been saying since the FCC first added foreign-made consumer routers to the Covered List in March. The biggest practical risk from a router isn't where it was made. It's whether vulnerabilities get patched.

What Changed

The March 2026 update to the FCC Covered List blocked new equipment authorizations for foreign-made consumer routers, citing supply-chain and national-security concerns. The policy cited the kind of intrusions we've seen from Volt Typhoon, Flax Typhoon, and Salt Typhoon, all of which have leaned heavily on compromised edge devices.

But the original framing missed how router compromises actually happen at scale. Compromising flawed software is far easier and cheaper than compromising a supply chain. Most successful router attacks exploit known, unpatched vulnerabilities in older devices. The original order would have prohibited router manufacturers from solving this problem starting in 2027, leaving tens of millions of devices open to attacks—indefinitely.

By allowing firmware updates, the FCC has given manufacturers time to resolve cybersecurity issues for routers already in the field. However, this waiver only extends until 2029, so this issue has been delayed, not resolved.

Why Country of Origin Doesn't Predict Security

Back in March, our Chief Security Officer, Sharon Hagi, pointed out that the consumer router conversation isn't really about consumer devices at all. It's about the access path. A compromised home router sits between a remote employee's laptop and the corporate applications they reach with standard credentials. From an attacker's perspective, that's a man-in-the-middle position with a clear line into enterprise systems. The same vulnerability class that gets framed as a "consumer issue" routinely shows up in nation-state intrusion playbooks like the ones we've seen from Volt Typhoon.

Our General Counsel, Eric Greenwald, made a related point at the time: the vast majority of router-borne attacks rely on known CVEs (for which patches are available) against devices that, in some cases, have already reached end of life. That hands attackers a bounty of low-hanging fruit. Nation-state actors don't need to engineer a supply-chain compromise when, as Eric put it, the ecosystem is already "littered with devices that are child's play to commandeer."

When the ban first dropped, our founder and CEO, Matt Wyckhouse, explained the complexity of the router supply chain. Even routers assembled in the United States by American companies are using chipsets, firmware, and other components from all over the world. Today, a fully domestic router supply chain does not exist. Finite State also pointed out the patch problem early on. In a WIRED feature, Matt warned that blocking firmware updates would result in “millions of deployed routers frozen in time.”

After the extension was announced, our Senior Product Security Consultant, Joshua Marpet, named the economic reason the patch pipeline runs dry when a product line gets banned: router manufacturers have little incentive to keep issuing security updates for devices they can no longer sell. Preserving the market is what preserves the patches.

None of this argues that the underlying supply-chain concerns aren't real. They are. But a remedy that severs the patch pipeline for tens of millions of in-service devices is counterproductive.

What This Means for Device Makers

The waiver extension is welcome, but it's a reprieve, not a permanent fix. January 2029 marks the final weeks of the current administration, and policy on foreign-made network equipment will keep shifting.

The FCC's order is, at root, an onshoring mandate. The Covered List bars new foreign-made router models from entering the US market, and the FCC's Conditional Approval framework requires manufacturers to submit concrete plans for US production. Authorization is now a sustained engineering and operations commitment, and device makers should treat it that way.

But onshoring the supply chain and securing the device are two different problems. A router assembled in the US can ship with the same exploitable firmware as one assembled overseas. To really address the risk of unpatched vulnerabilities on millions of edge devices across the United States, manufacturers have to look at software quality, not manufacturing geography.

To solve this problem, manufacturers need to know what firmware is actually installed and running in the field, produce regular updates for every shipped version, and, crucially, find and fix firmware vulnerabilities before release. Manufacturers can’t be disinterested suppliers of new software versions. They have to commit to addressing the ubiquity of vulnerabilities that led the FCC to place routers on the Covered List in the first place.

This is the work Finite State spends most days helping connected-device makers do, grounded in deep firmware binary analysis of what actually ships rather than what a source manifest claims. We scan every build as it changes and continuously correlate shipped software against new vulnerability intelligence as it surfaces, so the exposure picture stays current between releases. The product security teams that handle the next policy shift well will be the ones who already have that view across their deployed devices on the day the rule changes.

The Real Question

The FCC's reversal is the right decision for cybersecurity. It's also a quiet acknowledgment of the next challenge for policy work on connected devices: a device's security posture is determined by the quality of its software, not just where it was assembled.

For everyone building, deploying, or regulating these systems, the practical question isn't where the box was built. It's whether the device was built to be secure, whether it’s consistently maintained, and whether your devices—today—are keeping your customers secure or putting them at risk.

If you don't already have that view of what you've deployed, building it is exactly the work this moment requires. (And if you need help getting there, that's what we do.) Talk to our team about what that looks like for your specific products and regulatory context.

Finite State provides software and firmware analysis, SBOM generation, and compliance evidence for connected-device manufacturers. finitestate.io

Tags

#regulation

Related Articles

Road to Compliance: First Steps OEMs and Suppliers Should Take Today

The Road to Compliance: First Steps OEMs and Suppliers Should Take Today

Learn how to achieve Connected Vehicle Rule compliance with six actionable steps — from SBOM & HBOM generation to supplier engagement and risk evaluat...

Oct 20, 2025
Legacy Software & CVR Compliance Carveouts Explained

Legacy Software & CVR Compliance Carveouts Explained

Learn how legacy carveouts and specific authorizations can help you comply with CVR—while time-limited, they demand proactive planning now.

Oct 16, 2025
Regulations Driving IoT Security Forward

Regulations Driving IoT Security Forward

From EU CRA to FDA 524B, IoT regulations are reshaping the market. Learn what manufacturers need for compliance—SBOMs, testing, and supply chain visib...

Sep 24, 2025

Ready to Level Up Your Security Knowledge?

Join thousands of security professionals learning from the best in the industry

Start Learning TodayStart Learning Today
Finite StateFinite State

Finite State is the Product Security Automation Platform that functions as an autonomous Product Security OS: design → verify → prove, grounded in what you ship.

Platform

Platform Overview
Ground Truth Inventory
Exploitability-Based Prioritization
Design-Time Architecture Security
Automated Evidence-Backed Compliance

Solutions

Device Manufacturers
Automotive
Medical Devices
Energy & Utilities
Government
Industrial

Resources

Blog
Resource Library
Webinars & Videos
Events
Documentation

Company

About Us
CareersHIRING
Press & News
Contact Sales
Media Inquiries
X

© 2026 Finite State. All rights reserved.

Privacy PolicyTerms of UseCustomer Terms and Conditions
Finite StateFinite State
Finite StateFinite State