Re: And they are getting infected how?
Ancient kernel versions infested with binary blobs, uPNP enabled out of the box, web interface with glaring vulnerabilities accessible from the WAN, no SMB egress filtering, backdoors in stock firmware, "telemetry," insecure browsers running malicious js/vb/skiddie-language-du-jour, Windows 10 p2p patches distribution punching holes in the firewall and so on.
How many more vectors do you need? Consumer IT is one big maelstrom of beta testing, spyware and experiments in Darwinism - and these same TLAs are making it worse by keeping the tasty vulns to themselves for use in projects with twee uppercase names.
So no, Feds, nobody is buying your "caring" advice.