To compare, Qualcomm's Networking Pro 820 platform uses kernel 5.4, which will EOL in December 2025, which is at least a bit better.
Last time I looked at the QSDK - they're off the trunk, so their kernel is somewhat "private" in that once they commit to that kernel, they don't pull from upstream. They do commit upstream from time to time, and they will do CVE fixes for many CVE's on their own...
Once the OEM locks down their code for the device, typically they won't pull any updates from Qualcomm, so essentially they're a snapshot of a snapshot...
On a past project - we would do a CVE scan against the kernel and other upstream components in the BSP, and do the review for any possible impact, and remediate accordingly - normally addressing the Medium, High, and Critical items if they were not addressed already by Qualcomm...
The generic kernel, as we all know, is pretty large and complex, and has a lot of subsystems that are not built by default, and more importantly, in a Router application, we typically turn off in kconfig any unneeded options - mostly to reduce the size of the kernel, and reduce complexity where it is not needed - this is for maintaining the kernel over time, and to reduce the security surface.
So between internal efforts, along with the occasional maint update from the chipset vendors, it's not as big of a task as it sounds like - most quality vendors I know have at least a couple of dedicated kernel devs on the team...