What Is a CVE? Router Security Vulnerabilities Explained
CVE stands for Common Vulnerabilities and Exposures. Understanding CVEs helps you know whether your router has known security holes and how serious they are.
CVE stands for Common Vulnerabilities and Exposures. Understanding CVEs helps you know whether your router has known security holes and how serious they are.
CVE stands for Common Vulnerabilities and Exposures. It is a standardized naming system for publicly disclosed security vulnerabilities. When a security researcher or company discovers a vulnerability in software or hardware, it gets assigned a CVE number (like CVE-2023-1389) and added to the National Vulnerability Database (NVD) maintained by NIST.
A CVE ID has the format CVE-[YEAR]-[NUMBER]. For example, CVE-2023-1389 means it was first reported or assigned in 2023, and is the 1,389th CVE assigned that year. The number has no bearing on severity - that's what the CVSS score is for.
CVSS stands for Common Vulnerability Scoring System. It scores vulnerabilities on a scale of 0–10 based on factors like exploitability, impact, and whether it requires physical access. Scores above 9.0 are Critical. 7.0–8.9 are High. 4.0–6.9 are Medium. Below 4.0 are Low.
Common router CVEs include remote code execution (attacker runs code on your router), authentication bypass (attacker bypasses login), and credential disclosure (default or hardcoded passwords exposed). The most dangerous router CVEs have CVSS scores above 9.0. CVE-2023-1389 (CVSS 9.8) in the TP-Link Archer AX21 allowed remote code execution with no authentication.
Routers run complex software (Linux, web servers, DHCP, DNS, VPN) on hardware that rarely gets updated. Many routers run the same underlying software across thousands of models. When a vulnerability is found in a shared library, it can affect hundreds of router models at once. Consumer routers are also rarely rebooted, so they run vulnerable software continuously for years.
Search your router model on ismyroutersafe.com - we list all known CVEs for each router in our database. You can also search the NVD (nvd.nist.gov) by vendor and product name.
No. A CVE means a vulnerability has been found and documented - not that your router has been exploited. However, once a CVE is public, attackers have a blueprint for exploitation. The window between publication and exploitation can be days or weeks.
Update your router firmware immediately. Go to your router's admin panel (usually 192.168.1.1 or 192.168.0.1), find Firmware Update, and install the latest version. If your router is end-of-life and no patch is available, replacement is the only option.
CVEs are found by security researchers (independent and corporate), bug bounty programs, automated vulnerability scanners, and occasionally by observing active attacks. Companies like TP-Link, Asus, and Netgear have their own security teams that discover and disclose CVEs.
A CVE is a documented, publicly disclosed vulnerability. A zero-day is a vulnerability that is unknown to the vendor - there is no patch and often no public CVE yet. Zero-days are more dangerous because there is no fix available. Once discovered and disclosed, a zero-day typically gets a CVE number.
CHECK YOUR ROUTER
Enter your model to get a full security report - FCC status, CVEs, grade, and your action plan.
Check a Router → Top 10 Safe Routers