During installation, the router sent several data packets to an Amazon server in the US. These packets contained the configured SSID name and password in clear text, as well as some identification tokens for this network within a broader database and an access token for a user session that could potentially enable a MITM attack.
Linksys has refused to acknowledge/respond to the issue.
Ubiquiti gear is very solid for the price. Start with their dream machine (check eBay for used, just saw one for $150, otherwise $300 new), and then add nano access points as needed. Enterprise gear for a fraction of the price.
You can also run the Network Controller on any PC or even Home Assistant if you dont need to do any advanced traffic routing features.
The only disadvantage is that updates cannot be automatically applied while the network controller is off, the APs however do work fine without it, as long as they are configured once.
Isn’t Ubiquiti back to being a “have to make a cloud account to control all your local devices” company?
They’re either or. Their configuration device is called a cloud key, but it runs locally on your network. You can choose to enable cloud management, though everything can be administered locally, nor do they punish you for it.