In a significant move to secure the U.S. technology supply chain, the Federal Communications Commission (FCC) has banned the import and sale of all new foreign-produced consumer-grade routers. Effective March 23, 2026, this entire product category was added to the FCC's "Covered List," a designation for equipment deemed to pose an unacceptable risk to national security. The decision follows a determination by a White House interagency body that these devices could be exploited by state-sponsored actors for espionage, data exfiltration, and attacks against U.S. critical infrastructure. The ban will profoundly impact the consumer networking market, affecting major manufacturers who produce devices in China and other foreign countries.
The FCC's action is based on authority granted by the Secure and Trusted Communications Networks Act. The core of the decision is the addition of "foreign-produced consumer-grade routers" to the Covered List. This means:
This decision was prompted by a formal determination from an Executive Branch interagency body, which found that threat actors, including state-sponsored groups like Volt Typhoon, Flax Typhoon, and Salt Typhoon, actively exploit vulnerabilities in such devices. The notice warned these routers could provide "built-in backdoors to American homes, businesses, critical infrastructure, and emergency services."
While the order does not name any specific country, it is widely seen as targeting Chinese manufacturers, which dominate the global market. Key companies affected include:
The FCC has indicated there will be a process for companies to seek exemptions, potentially through a "whitelisting" process where they can prove their devices and supply chains are secure.
This ban has significant business and operational impacts:
For affected manufacturers and importers:
For enterprises, this is a clear signal to re-evaluate supply chain risk for all networking equipment. Organizations should prioritize vendors who can demonstrate strong security practices throughout their development and manufacturing lifecycle.
Violation of the FCC's order can result in significant penalties, including fines and the seizure of unauthorized equipment. The primary enforcement mechanism is the denial of FCC authorization, which effectively blocks products from the U.S. market.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats