Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9675: Improper Export of Android Application Components in Voice Changer App

0
Medium
VulnerabilityCVE-2025-9675cvecve-2025-9675
Published: Fri Aug 29 2025 (08/29/2025, 20:32:09 UTC)
Source: CVE Database V5
Product: Voice Changer App

Description

A vulnerability was determined in Voice Changer App up to 1.1.0. This issue affects some unknown processing of the file AndroidManifest.xml of the component com.tuyangkeji.changevoice. Executing manipulation can lead to improper export of android application components. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

AILast updated: 09/07/2025, 00:28:32 UTC

Technical Analysis

CVE-2025-9675 is a medium-severity vulnerability identified in the Voice Changer App versions up to 1.1.0. The root cause lies in improper exportation of Android application components due to incorrect processing of the AndroidManifest.xml file, specifically within the component com.tuyangkeji.changevoice. AndroidManifest.xml defines the app's components and their exposure to other apps or system processes. Improper export settings can unintentionally expose sensitive components such as activities, services, or broadcast receivers to other apps or local attackers. In this case, the vulnerability allows an attacker with local access to the device (local host) to manipulate the app's exported components, potentially leading to unauthorized interactions with the app’s internal components. The attack does not require user interaction and can be performed with low privileges, increasing its risk. The CVSS 4.0 vector indicates low attack complexity, no user interaction, and limited scope impact, with partial confidentiality, integrity, and availability impacts. Although no known exploits are currently in the wild, the vulnerability has been publicly disclosed, which may increase the risk of exploitation. The vulnerability is specific to Android devices running the affected versions of the Voice Changer App, which is a consumer-oriented application used for modifying voice recordings or live voice input.

Potential Impact

For European organizations, the direct impact of this vulnerability is likely limited to employees or users who have installed the vulnerable Voice Changer App on their Android devices. If such devices are used within corporate environments, especially those with access to sensitive data or internal networks, the improper export of components could be leveraged by a local attacker or malicious app to escalate privileges, intercept or manipulate data, or disrupt app functionality. This could lead to partial compromise of device confidentiality and integrity, potentially enabling lateral movement or data leakage within corporate networks. However, since exploitation requires local access and the app is consumer-focused, the threat surface is narrower compared to network-exposed vulnerabilities. Still, organizations with Bring Your Own Device (BYOD) policies or those in sectors with high privacy requirements (e.g., finance, healthcare) should be cautious. Additionally, the vulnerability could be used as part of a multi-stage attack chain if combined with other exploits to gain broader access.

Mitigation Recommendations

Organizations should ensure that all Android devices, especially those used in corporate environments, update the Voice Changer App to a patched version once available. Until a patch is released, users should be advised to uninstall the app or restrict its usage on devices that access sensitive information. Mobile Device Management (MDM) solutions can be employed to monitor app installations and enforce policies that prevent installation of vulnerable app versions. Security teams should audit AndroidManifest.xml configurations for in-house or third-party apps to detect improper component exports proactively. Additionally, applying the principle of least privilege on Android devices by disabling installation from untrusted sources and restricting app permissions can reduce the risk. User education about the risks of installing apps from unofficial sources and the importance of updates is also critical. Finally, monitoring for unusual local app interactions or privilege escalations on Android endpoints can help detect exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-29T10:25:30.375Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b211f4ad5a09ad007b4663

Added to database: 8/29/2025, 8:47:48 PM

Last enriched: 9/7/2025, 12:28:32 AM

Last updated: 10/14/2025, 12:29:26 PM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats