CVE-2026-26959

7.8 HIGH

📋 TL;DR

ADB Explorer versions 0.9.26020 and below fail to validate the ADB binary path before execution, allowing arbitrary code execution with current user privileges. Attackers can exploit this by tricking users into launching the application with a malicious configuration file. This affects all Windows users running vulnerable versions of ADB Explorer.

💻 Affected Systems

Products:
  • ADB Explorer
Versions: Versions 0.9.26020 and below
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration when using ManualAdbPath setting.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with current user privileges, potentially leading to privilege escalation, data theft, or ransomware deployment.

🟠

Likely Case

Local code execution allowing malware installation, credential harvesting, or persistence mechanisms.

🟢

If Mitigated

No impact if patched or proper security controls prevent execution of untrusted files.

🌐 Internet-Facing: LOW - Exploitation requires local access or convincing user to execute malicious files.
🏢 Internal Only: MEDIUM - Social engineering attacks could lead to exploitation within organizational environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction to launch application with malicious configuration, but the technique is straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.9.26021

Vendor Advisory: https://github.com/Alex4SSB/ADB-Explorer/security/advisories/GHSA-gcgv-2jq7-74rp

Restart Required: Yes

Instructions:

1. Download version 0.9.26021 or later from GitHub releases. 2. Uninstall previous version. 3. Install new version. 4. Restart system if ADB Explorer was running.

🔧 Temporary Workarounds

Disable Manual ADB Path

windows

Remove or secure the App.txt configuration file to prevent specifying arbitrary ADB paths.

Remove or rename %LOCALAPPDATA%\ADB-Explorer\App.txt

Restrict Configuration Directory

windows

Set strict permissions on ADB Explorer configuration directory to prevent unauthorized modifications.

icacls "%LOCALAPPDATA%\ADB-Explorer" /deny Everyone:(OI)(CI)F

🧯 If You Can't Patch

  • Disable ADB Explorer entirely and use alternative ADB management tools
  • Implement application whitelisting to prevent execution of unauthorized binaries

🔍 How to Verify

Check if Vulnerable:

Check Help > About in ADB Explorer or examine the executable file version properties.

Check Version:

wmic datafile where name="C:\\Program Files\\ADB Explorer\\ADBExplorer.exe" get version

Verify Fix Applied:

Confirm version is 0.9.26021 or higher in Help > About menu.

📡 Detection & Monitoring

Log Indicators:

  • Process creation events for unexpected executables from ADB Explorer directory
  • File modifications to App.txt configuration file

Network Indicators:

  • Unusual outbound connections from ADB Explorer process

SIEM Query:

Process Creation where Image contains "ADBExplorer.exe" and CommandLine contains "-config"

🔗 References

📤 Share & Export