High severity8.8NVD Advisory· Published May 4, 2026· Updated May 5, 2026
CVE-2026-0073
CVE-2026-0073
Description
In adbd_tls_verify_cert of auth.cpp, there is a possible bypass of wireless ADB mutual authentication due to a logic error in the code. This could lead to remote (proximal/adjacent) code execution as the shell user with no additional execution privileges needed. User interaction is not needed for exploitation.
Affected products
6cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*+ 5 more
- cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:16.0:-:*:*:*:*:*:*
- cpe:2.3:o:google:android:16.0:qpr2_beta_1:*:*:*:*:*:*
- cpe:2.3:o:google:android:16.0:qpr2_beta_2:*:*:*:*:*:*
- cpe:2.3:o:google:android:16.0:qpr2_beta_3:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- source.android.com/docs/security/bulletin/2026/2026-05-01nvdVendor Advisory
News mentions
2- ⚡ Weekly Recap: Linux Rootkit, macOS Crypto Stealer, WebSocket Skimmers and MoreThe Hacker News · May 11, 2026
- Critical Remote Code Execution Vulnerability Patched in AndroidSecurityWeek · May 5, 2026