Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27615: CWE-40: Path Traversal: 'UNCsharename' (Windows UNC Share) in Alex4SSB ADB-Explorer

0
High
VulnerabilityCVE-2026-27615cvecve-2026-27615cwe-40cwe-829
Published: Wed Feb 25 2026 (02/25/2026, 02:33:53 UTC)
Source: CVE Database V5
Vendor/Project: Alex4SSB
Product: ADB-Explorer

Description

CVE-2026-27615 is a high-severity path traversal vulnerability in Alex4SSB's ADB-Explorer versions prior to Beta 0. 9. 26022. The flaw allows an attacker to manipulate the 'ManualAdbPath' setting to point to a malicious UNC network share, enabling remote code execution with the privileges of the user running the app. Exploitation requires tricking a user into launching the app with a crafted settings file, often delivered via a shortcut or archive. This vulnerability can lead to full system compromise if exploited. The issue is fixed in Beta 0. 9. 26022. No known exploits are currently reported in the wild.

AI-Powered Analysis

AILast updated: 02/25/2026, 03:25:46 UTC

Technical Analysis

CVE-2026-27615 is a path traversal vulnerability categorized under CWE-40 and CWE-829 affecting the ADB-Explorer application by Alex4SSB on Windows platforms. The vulnerability arises because the application allows the 'ManualAdbPath' configuration variable, which specifies the path to the ADB binary, to be set to a Universal Naming Convention (UNC) path. This means an attacker can configure the application to execute a binary located on a remote network share controlled by the attacker. Since the application executes this binary with the privileges of the current user, this leads to remote code execution (RCE). The attack vector involves convincing a user to run a shortcut or launch the app with a malicious 'App.txt' settings file that sets the 'ManualAdbPath' to the attacker's UNC share. This can be delivered via social engineering, such as through an archive file containing the malicious shortcut. The vulnerability affects all versions before Beta 0.9.26022, which contains the fix. The CVSS 4.0 score is 8.8 (high), reflecting the ease of exploitation with user interaction, no privileges required, and the high impact on confidentiality, integrity, and availability. No public exploits are known yet, but the potential for significant damage exists due to the ability to execute arbitrary code remotely.

Potential Impact

The impact of CVE-2026-27615 is significant for organizations using vulnerable versions of ADB-Explorer on Windows. Successful exploitation allows attackers to execute arbitrary code remotely with the same privileges as the user running the application, potentially leading to full system compromise. This can result in data theft, installation of persistent malware, lateral movement within networks, and disruption of operations. Since ADB-Explorer is a tool used for Android Debug Bridge (ADB) operations, it is likely employed by developers, testers, and IT administrators, making these groups particularly at risk. The vulnerability could be exploited in targeted attacks or through phishing campaigns distributing malicious shortcuts or archives. The requirement for user interaction limits mass exploitation but does not eliminate risk, especially in environments where users may run untrusted files. Organizations with sensitive data or critical infrastructure using this tool must prioritize remediation to avoid severe confidentiality, integrity, and availability breaches.

Mitigation Recommendations

To mitigate CVE-2026-27615, organizations should immediately upgrade ADB-Explorer to version Beta 0.9.26022 or later, where the vulnerability is fixed. Until the update is applied, users should avoid running shortcuts or configuration files from untrusted sources that could manipulate the 'ManualAdbPath' setting. Implement strict controls on file downloads and email attachments to reduce the risk of social engineering attacks delivering malicious archives or shortcuts. Employ endpoint protection solutions capable of detecting suspicious execution from UNC paths. Network segmentation and restricting SMB/UNC access to only trusted servers can reduce exposure to malicious network shares. Additionally, educate users about the risks of running unknown shortcuts or configuration files and enforce the principle of least privilege to limit the impact if exploitation occurs. Monitoring logs for unusual ADB-Explorer executions or network share accesses can help detect exploitation attempts early.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-20T19:43:14.603Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699e6864b7ef31ef0bae9d1a

Added to database: 2/25/2026, 3:11:32 AM

Last enriched: 2/25/2026, 3:25:46 AM

Last updated: 2/25/2026, 5:24:49 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats