ADB Explorer is a fluent UI for ADB on Windows. Prior to Beta 0.9.26020, ADB Explorer is vulnerable to Insecure Deserialization leading to Remote Code Execution. The application attempts to deserialize the App.txt settings file using Newtonsoft.Json with TypeNameHandling set to Objects. This allows an attacker to supply a crafted JSON file containing a gadget chain (e.g., ObjectDataProvider) to execute arbitrary code when the application launches and subsequently saves its settings. This vulnerability is fixed in Beta 0.9.26020.
References
Configurations
No configuration.
History
13 Feb 2026, 19:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-13 19:17
Updated : 2026-02-13 21:43
NVD link : CVE-2026-26208
Mitre link : CVE-2026-26208
CVE.ORG link : CVE-2026-26208
JSON object : View
Products Affected
No product.
CWE
CWE-502
Deserialization of Untrusted Data
