GBHackers

PoC Exploit Released for Android Zero-Click Flaw Enabling Remote Shell Access


Public references indicate that a GitHub proof-of-concept is now circulating for CVE-2026-0073, the critical Android flaw documented in Google’s May 2026 security bulletin, raising the urgency for defenders with wireless ADB enabled on test or production devices.

Google and multiple security reports describe the issue as a no-interaction remote code execution vulnerability in Android’s adbd component that allows an attacker to execute code as the shell user without any interaction from the device owner.

Authentication flaw

At the center of CVE-2026-0073 is a logic error in the wireless ADB mutual-authentication path, specifically in the adbd_tls_verify_cert function inside auth.cpp.

Security reporting says the vulnerable code can incorrectly treat a crafted TLS client certificate as trusted, allowing an unauthorized remote system to impersonate a paired ADB host and open a shell session.

This makes the bug an authentication bypass rather than a classic memory-corruption issue, which is why it is especially notable: the trust decision fails before normal debugging protections can stop the session.

The weakness is serious because ADB is not an ordinary application channel; it is Android’s built-in debugging interface. Once that interface is exposed to an attacker, security reports note that the resulting shell-level access bypasses normal app sandbox expectations and provides a much more powerful operating-system foothold.

In real environments, this can affect developer phones, lab devices, emulators, and enterprise test fleets where wireless debugging was enabled for convenience and later left reachable.

Exploitation path

Reports on the flaw say exploitation requires network reachability to the device’s ADB-over-TCP service, most commonly through wireless debugging or another exposed ADB configuration.

The attacker does not need user interaction, and the threat is most relevant on adjacent or shared networks where a reachable ADB endpoint remains available.

Public exploit references from barghest suggest researchers have already moved the issue from advisory language into a reproducible attack path, reducing the time defenders usually have between disclosure and practical abuse.

That changes the risk profile for organizations that rely on Android devices in development, mobile testing, device forensics, or kiosk deployments.

Even though the compromise is described as shell-level rather than root, shell access through ADB still gives attackers a strong position for system inspection, package interaction, and follow-on activity.

RunZero’s post-disclosure guidance on locating Android Debug Bridge services on networks reinforces that asset discovery and exposure reduction are now key parts of response.

Safe remediation snippet for publication instead of exploit code:

cpp
// Defensive fix: only accept an exact key match
bool verified = false;
if (EVP_PKEY_cmp(known_evp.get(), evp_pkey.get()) == 1) {
verified = true;
} else {
verified = false;
}

Google has already addressed the issue in the May 2026 Android Security Bulletin, which lists CVE-2026-0073 under the adbd subcomponent.

External reporting also notes that the flaw was rated critical, underscoring the impact of a bug that can turn a reachable wireless debugging service into unauthorized shell access.

For defenders, the priority is clear: patch affected devices, turn off wireless debugging where it is not actively needed, and treat every LAN- or internet-reachable ADB service as a sensitive attack surface until verified otherwise.

With public exploit references now visible, opportunistic scanning and targeted testing are likely to follow quickly.

Enterprises should assume that any exposed Android debugging endpoint may attract attention and should validate both patch status and network exposure without delay.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link