Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26959: CWE-829: Inclusion of Functionality from Untrusted Control Sphere in Alex4SSB ADB-Explorer

0
High
VulnerabilityCVE-2026-26959cvecve-2026-26959cwe-829
Published: Thu Feb 19 2026 (02/19/2026, 23:16:43 UTC)
Source: CVE Database V5
Vendor/Project: Alex4SSB
Product: ADB-Explorer

Description

CVE-2026-26959 is a high-severity vulnerability in Alex4SSB's ADB-Explorer (versions prior to 0. 9. 26021) that allows arbitrary code execution. The flaw arises because the application does not validate the integrity or authenticity of the ADB binary path specified in the ManualAdbPath setting. An attacker can craft a malicious configuration file (App. txt) that points this setting to an arbitrary executable. By tricking a user into launching the application with a command-line argument referencing the malicious configuration directory, the attacker can execute code with the user's privileges. Exploitation requires user interaction, typically via social engineering such as distributing a shortcut bundled with the malicious settings. The vulnerability impacts confidentiality, integrity, and availability, and has a CVSS score of 7. 8.

AI-Powered Analysis

AILast updated: 02/19/2026, 23:46:30 UTC

Technical Analysis

The vulnerability CVE-2026-26959 affects Alex4SSB's ADB-Explorer, a Windows-based fluent UI for Android Debug Bridge (ADB). Versions 0.9.26020 and earlier fail to validate the ManualAdbPath setting, which specifies the path to the ADB binary. This lack of validation allows an attacker to supply a malicious App.txt configuration file that sets ManualAdbPath to an arbitrary executable. When the application is launched with a command-line argument pointing to the directory containing this malicious configuration, it executes the arbitrary executable with the current user's privileges. The attack vector relies on social engineering to convince the user to run the application with the crafted argument, often by distributing a shortcut or archive containing the malicious settings. This vulnerability is classified under CWE-829, indicating inclusion of functionality from an untrusted control sphere. The impact includes full compromise of confidentiality, integrity, and availability of the affected system under the user's context. The vulnerability has a CVSS 3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), reflecting local attack vector, low complexity, no privileges required, but user interaction needed. The vendor fixed the issue in version 0.9.26021, which properly validates the ADB binary path before execution.

Potential Impact

Successful exploitation of this vulnerability allows an attacker to execute arbitrary code with the privileges of the current user, potentially leading to full system compromise within that user context. This includes unauthorized access to sensitive data (confidentiality), modification or destruction of data (integrity), and disruption of system operations (availability). Since ADB-Explorer is a tool used by developers and IT professionals working with Android devices on Windows, compromised systems could be leveraged to pivot into broader networks or exfiltrate intellectual property. The attack requires user interaction but no prior authentication, making social engineering a critical risk factor. Organizations relying on ADB-Explorer for device management or development are at risk of targeted attacks, especially if users are tricked into launching the application with malicious configuration files. The vulnerability could also be used to deploy malware or ransomware, increasing operational and reputational damage.

Mitigation Recommendations

Organizations and users should immediately upgrade ADB-Explorer to version 0.9.26021 or later, where the vulnerability is fixed. Until upgrade, users should avoid launching the application with untrusted command-line arguments or configuration directories. Implement strict controls on the distribution and execution of configuration files, ensuring they come from trusted sources only. Employ endpoint protection solutions capable of detecting and blocking execution of unauthorized binaries. Educate users about the risks of opening shortcuts or archives from untrusted sources and the dangers of social engineering tactics. Consider application whitelisting to prevent execution of unknown executables referenced via ManualAdbPath. Regularly audit and monitor systems for unusual process launches or configuration changes related to ADB-Explorer. Finally, restrict user privileges where possible to limit the impact of any code execution.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-16T22:20:28.611Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69979d74d7880ec89b3b86a4

Added to database: 2/19/2026, 11:32:04 PM

Last enriched: 2/19/2026, 11:46:30 PM

Last updated: 2/20/2026, 2:48:23 AM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats