It's too bad.
Apple's routers had one thing over competitors - better overall security. By that I don't necessarily mean Wi-Fi security itself, but security at the router level.
AirPort routers have always tended to be "set it and forget it". Once you configured it, you were basically all set. Other than the very rare occasional software update, you basically just let the router sit there and do its job. Very little maintenance.
On the other hand, every other router company is trying to outfit their routers with every bell and whistle available in the toy store. They all are trying to one-up each other in features. The problem is, more features, more potential security flaws. And that's indeed been the case - we seem to be constantly hearing about yet another exploit on D-Link, Netgear, Linksys, any other major router brand. On the other hand, it was quite rare to hear of security flaws on AirPort devices.
AirPort devices have never exposed a "web UI" for configuration, requiring you to use the AirPort configuration program. This does cause some headaches when you're trying to use a very old device (I remember having to spin up a Windows XP VM just to configure an old AirPort Express I intended to use strictly as an AirPlay server) but on the other hand, this means less attack surface.
Hopefully some other router manufacturer will finally realize that a simple, no-frills, set-and-forget consumer router actually is a good idea. Grandma probably doesn't care about all the bells and whistles, and the particularly nerdy crowd will often roll their own solution or use alternative firmware. For the average home user, I always tended to recommend Apple routers, even for non-Apple users, since they were rock-solid, required little to no maintenance and basically just sat there doing the job quietly with little fuss.