So I buy another router from none of the above and stick it in front of the already massively sub netted Chromebook?
Back in December, Eloi Vanderbecken of Synacktiv Digital Security was visiting his family for the Christmas holiday, and for various reasons he had the need to gain administrative access to their Linksys WAG200G DSL gateway over Wi-Fi. He discovered that the device was listening on an undocumented Internet Protocol port number, and after analyzing the code in the firmware, he found that the port could be used to send administrative commands to the router without a password.
After Vanderbecken published his results, others confirmed that the same backdoor existed on other systems based on the same Sercomm modem, including home routers from Netgear, Cisco (both under the Cisco and Linksys brands), and Diamond. In January, Netgear and other vendors published a new version of the firmware that was supposed to close the back door.
The patch just obscured the backdoor, it’s still there. As pointed out in the comments, mitigating technology has anticipated this,
You can also upgrade to small business fire walling, etc. The gurus will fix SSL, but it sounds like buying another router manufactured with a different backdoor.
Sounds like a job for Pi.