Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.8
ADB Explorer on Windows fails to check ADB binary path, allowing malicious code execution
CVE-2026-26959
Summary
If you use ADB Explorer on Windows, be aware that versions 0.9.26020 and below do not properly check the safety of the ADB binary path. This can be exploited by a malicious file, allowing an attacker to run unauthorized code with your user permissions. Update to version 0.9.26021 or later to fix this issue.
Original title
ADB Explorer is a fluent UI for ADB on Windows. Versions 0.9.26020 and below fail to validate the integrity or authenticity of the ADB binary path specified in the ManualAdbPath setting before exec...
Original description
ADB Explorer is a fluent UI for ADB on Windows. Versions 0.9.26020 and below fail to validate the integrity or authenticity of the ADB binary path specified in the ManualAdbPath setting before executing it, allowing arbitrary code execution with the privileges of the current user. An attacker can exploit this by crafting a malicious App.txt settings file that points ManualAdbPath to an arbitrary executable, then convincing a victim to launch the application with a command-line argument directing it to the malicious configuration directory. This vulnerability could be leveraged through social engineering tactics, such as distributing a shortcut bundled with a crafted settings file in an archive, resulting in RCE upon application startup. Thus issue has been fixed in version 0.9.26021.
nvd CVSS3.1
7.8
Vulnerability type
CWE-829
Published: 20 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026