Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26959: CWE-829: Inclusion of Functionality from Untrusted Control Sphere in Alex4SSB ADB-Explorer

0
High
VulnerabilityCVE-2026-26959cvecve-2026-26959cwe-829
Published: Thu Feb 19 2026 (02/19/2026, 23:16:43 UTC)
Source: CVE Database V5
Vendor/Project: Alex4SSB
Product: ADB-Explorer

Description

ADB Explorer is a fluent UI for ADB on Windows. Versions 0.9.26020 and below fail to validate the integrity or authenticity of the ADB binary path specified in the ManualAdbPath setting before executing it, allowing arbitrary code execution with the privileges of the current user. An attacker can exploit this by crafting a malicious App.txt settings file that points ManualAdbPath to an arbitrary executable, then convincing a victim to launch the application with a command-line argument directing it to the malicious configuration directory. This vulnerability could be leveraged through social engineering tactics, such as distributing a shortcut bundled with a crafted settings file in an archive, resulting in RCE upon application startup. Thus issue has been fixed in version 0.9.26021.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 14:48:55 UTC

Technical Analysis

The vulnerability CVE-2026-26959 affects Alex4SSB's ADB-Explorer, a Windows-based fluent UI for Android Debug Bridge (ADB). Versions prior to 0.9.26021 fail to validate the ManualAdbPath setting, which specifies the path to the ADB binary executed by the application. This lack of validation allows an attacker to supply a malicious App.txt configuration file that sets ManualAdbPath to an arbitrary executable. When the victim launches ADB-Explorer with a command-line argument pointing to the directory containing this malicious configuration, the application executes the attacker-controlled binary with the current user's privileges. The attack vector relies on social engineering to convince users to launch the application with the crafted argument, for example, by distributing a shortcut bundled with the malicious settings file inside an archive. The vulnerability is classified under CWE-829, indicating inclusion of functionality from an untrusted control sphere. The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity but requiring user interaction and local access. No public exploits are known at this time, and the issue is resolved in version 0.9.26021.

Potential Impact

This vulnerability enables arbitrary code execution with the privileges of the current user, which can lead to full compromise of the affected system depending on user rights. Attackers can execute malicious payloads, steal sensitive data, install persistent backdoors, or disrupt system availability. Since ADB-Explorer is a tool used by developers and IT professionals working with Android devices on Windows, compromised systems could be leveraged to target development environments, steal intellectual property, or pivot to other internal network resources. The requirement for user interaction and local execution limits remote exploitation but does not eliminate risk, especially in environments where users may be tricked into opening malicious archives or shortcuts. Organizations relying on ADB-Explorer for device management or development could face operational disruptions and data breaches if the vulnerability is exploited.

Mitigation Recommendations

Organizations and users should immediately update ADB-Explorer to version 0.9.26021 or later, where the vulnerability is fixed. Until patching, users should avoid opening untrusted archives or shortcuts that launch ADB-Explorer with command-line arguments. Implement application whitelisting to restrict execution of unauthorized binaries, especially in directories where configuration files reside. Educate users about the risks of social engineering attacks involving malicious shortcuts or configuration files. Employ endpoint detection and response (EDR) tools to monitor for suspicious execution of ADB-Explorer or unexpected child processes spawned by it. Restrict user privileges to the minimum necessary to reduce the impact of potential code execution. Regularly audit and monitor file system changes in directories used by ADB-Explorer to detect unauthorized modifications. Finally, consider isolating development tools like ADB-Explorer in sandboxed environments to limit lateral movement in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-16T22:20:28.611Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69979d74d7880ec89b3b86a4

Added to database: 2/19/2026, 11:32:04 PM

Last enriched: 2/28/2026, 2:48:55 PM

Last updated: 4/5/2026, 3:43:54 AM

Views: 89

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses