CVE-2026-26208: CWE-502: Deserialization of Untrusted Data in Alex4SSB ADB-Explorer
ADB Explorer is a fluent UI for ADB on Windows. Prior to Beta 0.9.26020, ADB Explorer is vulnerable to Insecure Deserialization leading to Remote Code Execution. The application attempts to deserialize the App.txt settings file using Newtonsoft.Json with TypeNameHandling set to Objects. This allows an attacker to supply a crafted JSON file containing a gadget chain (e.g., ObjectDataProvider) to execute arbitrary code when the application launches and subsequently saves its settings. This vulnerability is fixed in Beta 0.9.26020.
AI Analysis
Technical Summary
CVE-2026-26208 is a vulnerability classified under CWE-502 (Deserialization of Untrusted Data) found in Alex4SSB's ADB-Explorer, a Windows-based fluent UI for Android Debug Bridge (ADB). Prior to Beta 0.9.26020, the application deserializes its App.txt settings file using the Newtonsoft.Json library with the TypeNameHandling setting configured to 'Objects'. This configuration enables polymorphic deserialization, which can be exploited by an attacker who crafts a malicious JSON file containing a gadget chain, such as ObjectDataProvider, to execute arbitrary code. When the application launches and reads this manipulated settings file, it deserializes the payload, triggering remote code execution (RCE) within the context of the user running the application. The vulnerability requires local access to replace or modify the App.txt file and user interaction to launch the vulnerable version of ADB-Explorer. The CVSS v3.1 score is 7.8 (high), reflecting the high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required but user interaction necessary. No known exploits are reported in the wild as of the publication date. The vulnerability is fixed in Beta 0.9.26020 by presumably changing the deserialization approach to avoid insecure TypeNameHandling or by validating input before deserialization.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to those involved in Android development, mobile device management, or IT departments using ADB-Explorer for device interfacing. Successful exploitation could lead to arbitrary code execution on affected Windows machines, potentially allowing attackers to install malware, steal sensitive data, or disrupt operations. Since the vulnerability affects the confidentiality, integrity, and availability of systems, it could facilitate lateral movement within networks if attackers gain initial access. The requirement for local access and user interaction limits remote exploitation but insider threats or compromised endpoints could be leveraged. Organizations with lax endpoint security or shared workstations are particularly vulnerable. The impact is heightened in sectors with strict data protection regulations like GDPR, as breaches could lead to regulatory penalties and reputational damage.
Mitigation Recommendations
1. Immediately update ADB-Explorer to Beta 0.9.26020 or later, where the vulnerability is fixed. 2. Restrict write permissions on the App.txt settings file to trusted users only to prevent unauthorized modification. 3. Implement endpoint security controls to detect and prevent unauthorized file changes and monitor for suspicious application launches. 4. Educate users about the risks of launching untrusted applications or files and enforce least privilege principles to limit the impact of potential exploitation. 5. Use application whitelisting to prevent execution of unauthorized or modified versions of ADB-Explorer. 6. Regularly audit and monitor systems for signs of compromise, focusing on Windows endpoints used for mobile device management. 7. Consider isolating development or device management environments to reduce exposure. 8. If updating is not immediately possible, disable or restrict usage of ADB-Explorer until patched.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2026-26208: CWE-502: Deserialization of Untrusted Data in Alex4SSB ADB-Explorer
Description
ADB Explorer is a fluent UI for ADB on Windows. Prior to Beta 0.9.26020, ADB Explorer is vulnerable to Insecure Deserialization leading to Remote Code Execution. The application attempts to deserialize the App.txt settings file using Newtonsoft.Json with TypeNameHandling set to Objects. This allows an attacker to supply a crafted JSON file containing a gadget chain (e.g., ObjectDataProvider) to execute arbitrary code when the application launches and subsequently saves its settings. This vulnerability is fixed in Beta 0.9.26020.
AI-Powered Analysis
Technical Analysis
CVE-2026-26208 is a vulnerability classified under CWE-502 (Deserialization of Untrusted Data) found in Alex4SSB's ADB-Explorer, a Windows-based fluent UI for Android Debug Bridge (ADB). Prior to Beta 0.9.26020, the application deserializes its App.txt settings file using the Newtonsoft.Json library with the TypeNameHandling setting configured to 'Objects'. This configuration enables polymorphic deserialization, which can be exploited by an attacker who crafts a malicious JSON file containing a gadget chain, such as ObjectDataProvider, to execute arbitrary code. When the application launches and reads this manipulated settings file, it deserializes the payload, triggering remote code execution (RCE) within the context of the user running the application. The vulnerability requires local access to replace or modify the App.txt file and user interaction to launch the vulnerable version of ADB-Explorer. The CVSS v3.1 score is 7.8 (high), reflecting the high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required but user interaction necessary. No known exploits are reported in the wild as of the publication date. The vulnerability is fixed in Beta 0.9.26020 by presumably changing the deserialization approach to avoid insecure TypeNameHandling or by validating input before deserialization.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to those involved in Android development, mobile device management, or IT departments using ADB-Explorer for device interfacing. Successful exploitation could lead to arbitrary code execution on affected Windows machines, potentially allowing attackers to install malware, steal sensitive data, or disrupt operations. Since the vulnerability affects the confidentiality, integrity, and availability of systems, it could facilitate lateral movement within networks if attackers gain initial access. The requirement for local access and user interaction limits remote exploitation but insider threats or compromised endpoints could be leveraged. Organizations with lax endpoint security or shared workstations are particularly vulnerable. The impact is heightened in sectors with strict data protection regulations like GDPR, as breaches could lead to regulatory penalties and reputational damage.
Mitigation Recommendations
1. Immediately update ADB-Explorer to Beta 0.9.26020 or later, where the vulnerability is fixed. 2. Restrict write permissions on the App.txt settings file to trusted users only to prevent unauthorized modification. 3. Implement endpoint security controls to detect and prevent unauthorized file changes and monitor for suspicious application launches. 4. Educate users about the risks of launching untrusted applications or files and enforce least privilege principles to limit the impact of potential exploitation. 5. Use application whitelisting to prevent execution of unauthorized or modified versions of ADB-Explorer. 6. Regularly audit and monitor systems for signs of compromise, focusing on Windows endpoints used for mobile device management. 7. Consider isolating development or device management environments to reduce exposure. 8. If updating is not immediately possible, disable or restrict usage of ADB-Explorer until patched.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-11T19:56:24.814Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698f793ac9e1ff5ad85a8a62
Added to database: 2/13/2026, 7:19:22 PM
Last enriched: 2/13/2026, 7:33:37 PM
Last updated: 2/13/2026, 8:23:04 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-26190: CWE-306: Missing Authentication for Critical Function in milvus-io milvus
CriticalCVE-2026-2441: Use after free in Google Chrome
HighCVE-2026-26187: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in treeverse lakeFS
HighCVE-2026-25991: CWE-918: Server-Side Request Forgery (SSRF) in TandoorRecipes recipes
HighCVE-2026-25964: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in TandoorRecipes recipes
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.