VYPR
Medium severity6.1OSV Advisory· Published Apr 22, 2024· Updated Apr 15, 2026

CVE-2024-32653

CVE-2024-32653

Description

jadx is a Dex to Java decompiler. Prior to version 1.5.0, the package name is not filtered before concatenation. This can be exploited to inject arbitrary code into the package name. The vulnerability allows an attacker to execute commands with shell privileges. Version 1.5.0 contains a patch for the vulnerability.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Jadx prior to 1.5.0 allows command injection via unsanitized package names, enabling shell command execution on connected Android devices.

The vulnerability resides in jadx-gui's ADB integration, where the fullAppName (derived from the decompiled app's package name) is concatenated directly into a shell command without sanitization [1]. Specifically, the command am start -D -n + fullAppName is executed via ADB.execShellCommandRaw [1][3]. An attacker can craft an Android app with a malicious package name containing shell metacharacters (e.g., |, ;) to inject arbitrary commands. When a user opens the malicious APK in jadx and clicks the "Launch App" button in the debug menu, the crafted package name causes shell command execution with the privileges of the adb shell [3]. The proof-of-concept package com.example | svc power shutdown | echo demonstrates immediate device shutdown upon launch [3]. This allows an attacker to execute arbitrary commands with shell privileges on the connected Android device, potentially leading to data theft, device manipulation, or denial of service [3]. The issue is fixed in version 1.5.0, which properly filters the package name before concatenation [2]. Users should upgrade to jadx 1.5.0 or later to mitigate the risk.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

1

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

3

News mentions

0

No linked articles in our index yet.