Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 13 Feb 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Alex4ssb
Alex4ssb adb-explorer |
|
| Vendors & Products |
Alex4ssb
Alex4ssb adb-explorer |
Fri, 13 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 13 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ADB Explorer is a fluent UI for ADB on Windows. Prior to Beta 0.9.26020, ADB Explorer is vulnerable to Insecure Deserialization leading to Remote Code Execution. The application attempts to deserialize the App.txt settings file using Newtonsoft.Json with TypeNameHandling set to Objects. This allows an attacker to supply a crafted JSON file containing a gadget chain (e.g., ObjectDataProvider) to execute arbitrary code when the application launches and subsequently saves its settings. This vulnerability is fixed in Beta 0.9.26020. | |
| Title | ADB Explorer Vulnerable to Remote Code Execution via Insecure Deserialization | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-13T19:21:56.476Z
Reserved: 2026-02-11T19:56:24.814Z
Link: CVE-2026-26208
Updated: 2026-02-13T19:21:48.389Z
Status : Awaiting Analysis
Published: 2026-02-13T19:17:29.420
Modified: 2026-02-13T21:43:11.137
Link: CVE-2026-26208
No data.
OpenCVE Enrichment
Updated: 2026-02-13T21:28:26Z