Texas Sues TP-Link Over Alleged Security Risks and Supply Chain Deception

Texas has sued TP-Link over alleged supply chain deception and router security flaws linked to Chinese threat actors.

Written By
thumbnail
Ken Underhill
Ken Underhill
Feb 19, 2026
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Texas has filed a lawsuit against networking manufacturer TP-Link Systems, accusing the company of misleading consumers about the security and origins of its routers while exposing users to exploitation by Chinese state-backed threat actors. 

The complaint alleges that TP-Link marketed its devices as secure and labeled them “Made in Vietnam,” despite sourcing nearly all components from China and failing to prevent firmware vulnerabilities from being abused in cyber operations.

“Behind TP-Link’s ‘Made in Vietnam’ stickers is a supply chain deeply entrenched in China, where nearly all of TP Link’s components are sourced before being shipped to Vietnam for mere final assembly,” said the Texas Attorney General in the lawsuit.

Geopolitics and Router Vulnerabilities

The lawsuit highlights how consumer and small-business networking hardware can evolve from a routine IT purchase into both a cybersecurity and national security concern. 

According to the complaint, Chinese law permits authorities to compel companies with Chinese supply chain ties to cooperate with government intelligence efforts. 

Texas Attorney General Ken Paxton argues that TP-Link’s alleged failure to clearly disclose the origin and sourcing of its products prevented consumers from fully understanding potential geopolitical and data security implications.

Beyond supply chain transparency, the suit cites a history of security vulnerabilities in TP-Link routers, some of which have been actively exploited in real-world attacks. 

The complaint alleges that firmware flaws were leveraged by Chinese state-linked threat actors to build botnet infrastructure and conduct credential-theft campaigns. 

Microsoft reported that the Quad7 botnet (also tracked as CovertNetwork-1658 or xlogin) was constructed largely from compromised home and small-business routers, many of them TP-Link devices, and used to carry out password-spray attacks and other malicious operations.

TP-Link has denied the allegations. In a statement to BleepingComputer, a company spokesperson described the claims as “without merit,” asserting that the Chinese government does not exercise ownership or control over the company, its products or its user data. 

The spokesperson further emphasized that TP-Link Systems Inc. operates as an independent American company, with core operations based in the United States and U.S. user networking data stored on AWS infrastructure. 

The company said it intends to “vigorously defend” its reputation as a provider of secure connectivity.

Advertisement

Hardening the Network Edge

As edge devices, routers can introduce meaningful risk if misconfigured, unpatched or inadequately monitored.

  • Keep router firmware patched, replace end-of-life hardware and verify patches are successfully applied across all devices.
  • Restrict administrative access by disabling internet-facing management interfaces, limiting access to trusted IP ranges and requiring VPN-based or segmented management networks.
  • Harden configurations by disabling unnecessary services, legacy protocols and UPnP, enforcing encrypted management access and changing all default credentials to strong, unique passwords with MFA where supported.
  • Segment critical systems from edge devices and isolate consumer-grade routers from sensitive enterprise assets to reduce lateral movement risk.
  • Enable continuous monitoring through IDS/IPS or NDR tools, log configuration changes and watch for unusual outbound traffic, DNS anomalies or signs of command-and-control activity.
  • Incorporate routers into formal vulnerability management and third-party risk programs, including vendor security reviews, supply chain assessments and periodic penetration testing. 

Collectively, these measures can help limit the blast radius of a compromised device and strengthen overall resilience across the network edge.

Advertisement

Edge Device Security and Vendor Risk

The outcome of Texas’ lawsuit against TP-Link could have broader implications for how networking vendors disclose supply chain details and address firmware security risks. 

As regulators increase scrutiny of foreign-linked technology providers, organizations may need to look beyond price and performance when selecting infrastructure hardware. 

In an environment where edge devices can serve as gateways for large-scale compromise, proactive governance and continuous oversight will be essential to maintaining trust and network resilience.

This is one reason why organizations are leveraging zero-trust solutions to continuously verify access across users, devices and infrastructure.

thumbnail
Ken Underhill

Ken Underhill is an award-winning cybersecurity professional, bestselling author, and seasoned IT professional. He holds a graduate degree in cybersecurity and information assurance from Western Governors University and brings years of hands-on experience to the field.

Recommended for you...

AI Agent Safety Checklist
Girish Redekar
Mar 12, 2026
Active Directory Flaw Enables SYSTEM Privilege Escalation
Ken Underhill
Mar 12, 2026
400K WordPress Sites Exposed by Elementor Ally Plugin SQL Flaw
Ken Underhill
Mar 12, 2026
Iran-Linked Hacktivists Claim Wiper Attack on Stryker Systems
Ken Underhill
Mar 12, 2026
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.