Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26208: CWE-502: Deserialization of Untrusted Data in Alex4SSB ADB-Explorer

0
High
VulnerabilityCVE-2026-26208cvecve-2026-26208cwe-502
Published: Fri Feb 13 2026 (02/13/2026, 18:48:56 UTC)
Source: CVE Database V5
Vendor/Project: Alex4SSB
Product: ADB-Explorer

Description

ADB Explorer is a fluent UI for ADB on Windows. Prior to Beta 0.9.26020, ADB Explorer is vulnerable to Insecure Deserialization leading to Remote Code Execution. The application attempts to deserialize the App.txt settings file using Newtonsoft.Json with TypeNameHandling set to Objects. This allows an attacker to supply a crafted JSON file containing a gadget chain (e.g., ObjectDataProvider) to execute arbitrary code when the application launches and subsequently saves its settings. This vulnerability is fixed in Beta 0.9.26020.

AI-Powered Analysis

AILast updated: 02/13/2026, 19:33:37 UTC

Technical Analysis

CVE-2026-26208 is a vulnerability classified under CWE-502 (Deserialization of Untrusted Data) found in Alex4SSB's ADB-Explorer, a Windows-based fluent UI for Android Debug Bridge (ADB). Prior to Beta 0.9.26020, the application deserializes its App.txt settings file using the Newtonsoft.Json library with the TypeNameHandling setting configured to 'Objects'. This configuration enables polymorphic deserialization, which can be exploited by an attacker who crafts a malicious JSON file containing a gadget chain, such as ObjectDataProvider, to execute arbitrary code. When the application launches and reads this manipulated settings file, it deserializes the payload, triggering remote code execution (RCE) within the context of the user running the application. The vulnerability requires local access to replace or modify the App.txt file and user interaction to launch the vulnerable version of ADB-Explorer. The CVSS v3.1 score is 7.8 (high), reflecting the high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required but user interaction necessary. No known exploits are reported in the wild as of the publication date. The vulnerability is fixed in Beta 0.9.26020 by presumably changing the deserialization approach to avoid insecure TypeNameHandling or by validating input before deserialization.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially to those involved in Android development, mobile device management, or IT departments using ADB-Explorer for device interfacing. Successful exploitation could lead to arbitrary code execution on affected Windows machines, potentially allowing attackers to install malware, steal sensitive data, or disrupt operations. Since the vulnerability affects the confidentiality, integrity, and availability of systems, it could facilitate lateral movement within networks if attackers gain initial access. The requirement for local access and user interaction limits remote exploitation but insider threats or compromised endpoints could be leveraged. Organizations with lax endpoint security or shared workstations are particularly vulnerable. The impact is heightened in sectors with strict data protection regulations like GDPR, as breaches could lead to regulatory penalties and reputational damage.

Mitigation Recommendations

1. Immediately update ADB-Explorer to Beta 0.9.26020 or later, where the vulnerability is fixed. 2. Restrict write permissions on the App.txt settings file to trusted users only to prevent unauthorized modification. 3. Implement endpoint security controls to detect and prevent unauthorized file changes and monitor for suspicious application launches. 4. Educate users about the risks of launching untrusted applications or files and enforce least privilege principles to limit the impact of potential exploitation. 5. Use application whitelisting to prevent execution of unauthorized or modified versions of ADB-Explorer. 6. Regularly audit and monitor systems for signs of compromise, focusing on Windows endpoints used for mobile device management. 7. Consider isolating development or device management environments to reduce exposure. 8. If updating is not immediately possible, disable or restrict usage of ADB-Explorer until patched.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-11T19:56:24.814Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698f793ac9e1ff5ad85a8a62

Added to database: 2/13/2026, 7:19:22 PM

Last enriched: 2/13/2026, 7:33:37 PM

Last updated: 2/13/2026, 8:23:04 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats