CVE-2026-27615: CWE-40: Path Traversal: 'UNCsharename' (Windows UNC Share) in Alex4SSB ADB-Explorer
ADB Explorer is a fluent UI for ADB on Windows. In versions prior to Beta 0.9.26022, ADB-Explorer allows the `ManualAdbPath` settings variable, which determines the path of the ADB binary to be executed, to be set to a Universal Naming Convention (UNC) path in the application's settings file. This allows an attacker to set the binary's path to point to a remote network resource, hosted on an attacker-controlled network share, thus granting the attacker full control over the binary being executed by the app. An attacker may leverage this vulnerability to execute code remotely on a victim's machine with the privileges of the user running the app. Exploitation is made possible by convincing a victim to run a shortcut of the app that points to a custom `App.txt` settings file, which sets `ManualAdbPath` (for example, when downloaded in an archive file). Version Beta 0.9.26022 fixes the issue.
AI Analysis
Technical Summary
CVE-2026-27615 is a path traversal vulnerability categorized under CWE-40 and CWE-829 affecting the Windows application ADB-Explorer by Alex4SSB. The vulnerability arises from the application's 'ManualAdbPath' configuration variable, which specifies the path to the ADB binary executed by the app. In versions before Beta 0.9.26022, this setting can be configured to a Universal Naming Convention (UNC) path pointing to a remote network share. An attacker can exploit this by crafting a malicious 'App.txt' settings file that sets 'ManualAdbPath' to a UNC share under attacker control. When a victim runs a shortcut to the app that loads this malicious settings file, the app executes the binary from the remote share, effectively running attacker-controlled code on the victim's machine with the same privileges as the user. The vulnerability requires user interaction (running the crafted shortcut) and does not require prior authentication. The attack leverages Windows UNC path handling and the app's trust in the settings file location. The vulnerability is rated with a CVSS 4.0 score of 8.8 (high severity), reflecting its potential for remote code execution, high impact on confidentiality, integrity, and availability, and the requirement for user interaction but no authentication. The issue was addressed in Beta 0.9.26022 by disallowing UNC paths for 'ManualAdbPath' or by validating the path input to prevent remote execution. No public exploits have been reported yet, but the vulnerability poses a significant risk due to the ease of social engineering and the potential for privilege escalation.
Potential Impact
If exploited, this vulnerability allows attackers to execute arbitrary code remotely on a victim's Windows machine with the privileges of the user running ADB-Explorer. This can lead to full system compromise, including data theft, installation of persistent malware, lateral movement within networks, and disruption of services. Because the attack vector involves user interaction via a malicious shortcut and settings file, targeted spear-phishing or supply chain attacks could leverage this to compromise developers or IT personnel who use ADB-Explorer for Android device management. The impact extends to organizations relying on ADB-Explorer in their development or device management workflows, potentially exposing sensitive intellectual property or internal network access. The vulnerability undermines system integrity and confidentiality and can cause availability issues if malicious payloads disrupt system operations. Given the high CVSS score and the nature of the vulnerability, organizations face a significant risk until patched.
Mitigation Recommendations
1. Immediately update ADB-Explorer to version Beta 0.9.26022 or later, which contains the fix preventing UNC path usage for 'ManualAdbPath'. 2. Implement strict controls on the distribution and execution of shortcuts and configuration files related to ADB-Explorer, ensuring they originate from trusted sources only. 3. Educate users, especially developers and IT staff, about the risks of running untrusted shortcuts or configuration files, emphasizing the social engineering aspect of this attack. 4. Employ endpoint protection solutions capable of detecting and blocking execution of binaries from untrusted network shares or unusual UNC paths. 5. Restrict network access to SMB shares and monitor for unusual UNC path access attempts on Windows hosts running ADB-Explorer. 6. Use application whitelisting to prevent execution of unauthorized binaries, particularly those loaded from network shares. 7. Regularly audit and monitor ADB-Explorer configurations to detect unauthorized changes to the 'ManualAdbPath' setting. 8. Consider isolating development environments or using virtual machines for running tools like ADB-Explorer to limit the blast radius of potential exploitation.
Affected Countries
United States, Germany, Japan, South Korea, China, India, United Kingdom, Canada, France, Australia
CVE-2026-27615: CWE-40: Path Traversal: 'UNCsharename' (Windows UNC Share) in Alex4SSB ADB-Explorer
Description
ADB Explorer is a fluent UI for ADB on Windows. In versions prior to Beta 0.9.26022, ADB-Explorer allows the `ManualAdbPath` settings variable, which determines the path of the ADB binary to be executed, to be set to a Universal Naming Convention (UNC) path in the application's settings file. This allows an attacker to set the binary's path to point to a remote network resource, hosted on an attacker-controlled network share, thus granting the attacker full control over the binary being executed by the app. An attacker may leverage this vulnerability to execute code remotely on a victim's machine with the privileges of the user running the app. Exploitation is made possible by convincing a victim to run a shortcut of the app that points to a custom `App.txt` settings file, which sets `ManualAdbPath` (for example, when downloaded in an archive file). Version Beta 0.9.26022 fixes the issue.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-27615 is a path traversal vulnerability categorized under CWE-40 and CWE-829 affecting the Windows application ADB-Explorer by Alex4SSB. The vulnerability arises from the application's 'ManualAdbPath' configuration variable, which specifies the path to the ADB binary executed by the app. In versions before Beta 0.9.26022, this setting can be configured to a Universal Naming Convention (UNC) path pointing to a remote network share. An attacker can exploit this by crafting a malicious 'App.txt' settings file that sets 'ManualAdbPath' to a UNC share under attacker control. When a victim runs a shortcut to the app that loads this malicious settings file, the app executes the binary from the remote share, effectively running attacker-controlled code on the victim's machine with the same privileges as the user. The vulnerability requires user interaction (running the crafted shortcut) and does not require prior authentication. The attack leverages Windows UNC path handling and the app's trust in the settings file location. The vulnerability is rated with a CVSS 4.0 score of 8.8 (high severity), reflecting its potential for remote code execution, high impact on confidentiality, integrity, and availability, and the requirement for user interaction but no authentication. The issue was addressed in Beta 0.9.26022 by disallowing UNC paths for 'ManualAdbPath' or by validating the path input to prevent remote execution. No public exploits have been reported yet, but the vulnerability poses a significant risk due to the ease of social engineering and the potential for privilege escalation.
Potential Impact
If exploited, this vulnerability allows attackers to execute arbitrary code remotely on a victim's Windows machine with the privileges of the user running ADB-Explorer. This can lead to full system compromise, including data theft, installation of persistent malware, lateral movement within networks, and disruption of services. Because the attack vector involves user interaction via a malicious shortcut and settings file, targeted spear-phishing or supply chain attacks could leverage this to compromise developers or IT personnel who use ADB-Explorer for Android device management. The impact extends to organizations relying on ADB-Explorer in their development or device management workflows, potentially exposing sensitive intellectual property or internal network access. The vulnerability undermines system integrity and confidentiality and can cause availability issues if malicious payloads disrupt system operations. Given the high CVSS score and the nature of the vulnerability, organizations face a significant risk until patched.
Mitigation Recommendations
1. Immediately update ADB-Explorer to version Beta 0.9.26022 or later, which contains the fix preventing UNC path usage for 'ManualAdbPath'. 2. Implement strict controls on the distribution and execution of shortcuts and configuration files related to ADB-Explorer, ensuring they originate from trusted sources only. 3. Educate users, especially developers and IT staff, about the risks of running untrusted shortcuts or configuration files, emphasizing the social engineering aspect of this attack. 4. Employ endpoint protection solutions capable of detecting and blocking execution of binaries from untrusted network shares or unusual UNC paths. 5. Restrict network access to SMB shares and monitor for unusual UNC path access attempts on Windows hosts running ADB-Explorer. 6. Use application whitelisting to prevent execution of unauthorized binaries, particularly those loaded from network shares. 7. Regularly audit and monitor ADB-Explorer configurations to detect unauthorized changes to the 'ManualAdbPath' setting. 8. Consider isolating development environments or using virtual machines for running tools like ADB-Explorer to limit the blast radius of potential exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-20T19:43:14.603Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699e6864b7ef31ef0bae9d1a
Added to database: 2/25/2026, 3:11:32 AM
Last enriched: 3/4/2026, 6:56:25 PM
Last updated: 4/11/2026, 4:44:58 AM
Views: 92
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.