Impact
This vulnerability results from the ADB Explorer application failing to verify the integrity or authenticity of the ADB binary path set in the ManualAdbPath configuration. An attacker can craft an App.txt file that points this setting to any executable, which the application will run with the current user’s privileges. The weakness is classified as CWE‑829, exposing the application to arbitrary code execution.
Affected Systems
The issue affects the ADB Explorer utility developed by Alex4SSB for Windows, specifically all releases version 0.9.26020 and earlier. Users should confirm the installed version and update if the affected range applies.
Risk and Exploitability
The CVSS base score of 7.8 marks the vulnerability as high severity, yet the EPSS score of less than 1% indicates a low likelihood of exploitation at present, and it is not listed in the CISA KEV catalog. Exploitation typically requires social engineering—delivering a malicious configuration directory via a shortcut or other launch method—so environments that routinely run ADB Explorer from untrusted locations or rely on user‑supplied launch scripts are at higher risk.
OpenCVE Enrichment