FKIE_CVE-2026-26208
Vulnerability from fkie_nvd - Published: 2026-02-13 19:17 - Updated: 2026-04-15 00:35
Severity ?
Summary
ADB Explorer is a fluent UI for ADB on Windows. Prior to Beta 0.9.26020, ADB Explorer is vulnerable to Insecure Deserialization leading to Remote Code Execution. The application attempts to deserialize the App.txt settings file using Newtonsoft.Json with TypeNameHandling set to Objects. This allows an attacker to supply a crafted JSON file containing a gadget chain (e.g., ObjectDataProvider) to execute arbitrary code when the application launches and subsequently saves its settings. This vulnerability is fixed in Beta 0.9.26020.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ADB Explorer is a fluent UI for ADB on Windows. Prior to Beta 0.9.26020, ADB Explorer is vulnerable to Insecure Deserialization leading to Remote Code Execution. The application attempts to deserialize the App.txt settings file using Newtonsoft.Json with TypeNameHandling set to Objects. This allows an attacker to supply a crafted JSON file containing a gadget chain (e.g., ObjectDataProvider) to execute arbitrary code when the application launches and subsequently saves its settings. This vulnerability is fixed in Beta 0.9.26020."
},
{
"lang": "es",
"value": "ADB Explorer es una interfaz de usuario fluida para ADB en Windows. Antes de la Beta 0.9.26020, ADB Explorer es vulnerable a deserializaci\u00f3n insegura que conduce a ejecuci\u00f3n remota de c\u00f3digo. La aplicaci\u00f3n intenta deserializar el archivo de configuraci\u00f3n App.txt usando Newtonsoft.Json con TypeNameHandling configurado en Objects. Esto permite a un atacante proporcionar un archivo JSON manipulado que contiene una cadena de gadgets (por ejemplo, ObjectDataProvider) para ejecutar c\u00f3digo arbitrario cuando la aplicaci\u00f3n se inicia y posteriormente guarda su configuraci\u00f3n. Esta vulnerabilidad est\u00e1 corregida en la Beta 0.9.26020."
}
],
"id": "CVE-2026-26208",
"lastModified": "2026-04-15T00:35:42.020",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2026-02-13T19:17:29.420",
"references": [
{
"source": "security-advisories@github.com",
"url": "https://github.com/Alex4SSB/ADB-Explorer/commit/776f132cede86e1405520f2a28c78276dda5ab5a"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/Alex4SSB/ADB-Explorer/issues/294"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/Alex4SSB/ADB-Explorer/releases/tag/v0.9.26020"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/Alex4SSB/ADB-Explorer/security/advisories/GHSA-49qx-wpxj-p4mh"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-502"
}
],
"source": "security-advisories@github.com",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…