CVE-2025-9675: Improper Export of Android Application Components in Voice Changer App
A vulnerability was determined in Voice Changer App up to 1.1.0. This issue affects some unknown processing of the file AndroidManifest.xml of the component com.tuyangkeji.changevoice. Executing manipulation can lead to improper export of android application components. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utilized.
AI Analysis
Technical Summary
CVE-2025-9675 is a medium-severity vulnerability identified in the Voice Changer App versions up to 1.1.0. The root cause lies in improper exportation of Android application components due to incorrect processing of the AndroidManifest.xml file, specifically within the component com.tuyangkeji.changevoice. AndroidManifest.xml defines the app's components and their exposure to other apps or system processes. Improper export settings can unintentionally expose sensitive components such as activities, services, or broadcast receivers to other apps or local attackers. In this case, the vulnerability allows an attacker with local access to the device (local host) to manipulate the app's exported components, potentially leading to unauthorized interactions with the app’s internal components. The attack does not require user interaction and can be performed with low privileges, increasing its risk. The CVSS 4.0 vector indicates low attack complexity, no user interaction, and limited scope impact, with partial confidentiality, integrity, and availability impacts. Although no known exploits are currently in the wild, the vulnerability has been publicly disclosed, which may increase the risk of exploitation. The vulnerability is specific to Android devices running the affected versions of the Voice Changer App, which is a consumer-oriented application used for modifying voice recordings or live voice input.
Potential Impact
For European organizations, the direct impact of this vulnerability is likely limited to employees or users who have installed the vulnerable Voice Changer App on their Android devices. If such devices are used within corporate environments, especially those with access to sensitive data or internal networks, the improper export of components could be leveraged by a local attacker or malicious app to escalate privileges, intercept or manipulate data, or disrupt app functionality. This could lead to partial compromise of device confidentiality and integrity, potentially enabling lateral movement or data leakage within corporate networks. However, since exploitation requires local access and the app is consumer-focused, the threat surface is narrower compared to network-exposed vulnerabilities. Still, organizations with Bring Your Own Device (BYOD) policies or those in sectors with high privacy requirements (e.g., finance, healthcare) should be cautious. Additionally, the vulnerability could be used as part of a multi-stage attack chain if combined with other exploits to gain broader access.
Mitigation Recommendations
Organizations should ensure that all Android devices, especially those used in corporate environments, update the Voice Changer App to a patched version once available. Until a patch is released, users should be advised to uninstall the app or restrict its usage on devices that access sensitive information. Mobile Device Management (MDM) solutions can be employed to monitor app installations and enforce policies that prevent installation of vulnerable app versions. Security teams should audit AndroidManifest.xml configurations for in-house or third-party apps to detect improper component exports proactively. Additionally, applying the principle of least privilege on Android devices by disabling installation from untrusted sources and restricting app permissions can reduce the risk. User education about the risks of installing apps from unofficial sources and the importance of updates is also critical. Finally, monitoring for unusual local app interactions or privilege escalations on Android endpoints can help detect exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland
CVE-2025-9675: Improper Export of Android Application Components in Voice Changer App
Description
A vulnerability was determined in Voice Changer App up to 1.1.0. This issue affects some unknown processing of the file AndroidManifest.xml of the component com.tuyangkeji.changevoice. Executing manipulation can lead to improper export of android application components. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utilized.
AI-Powered Analysis
Technical Analysis
CVE-2025-9675 is a medium-severity vulnerability identified in the Voice Changer App versions up to 1.1.0. The root cause lies in improper exportation of Android application components due to incorrect processing of the AndroidManifest.xml file, specifically within the component com.tuyangkeji.changevoice. AndroidManifest.xml defines the app's components and their exposure to other apps or system processes. Improper export settings can unintentionally expose sensitive components such as activities, services, or broadcast receivers to other apps or local attackers. In this case, the vulnerability allows an attacker with local access to the device (local host) to manipulate the app's exported components, potentially leading to unauthorized interactions with the app’s internal components. The attack does not require user interaction and can be performed with low privileges, increasing its risk. The CVSS 4.0 vector indicates low attack complexity, no user interaction, and limited scope impact, with partial confidentiality, integrity, and availability impacts. Although no known exploits are currently in the wild, the vulnerability has been publicly disclosed, which may increase the risk of exploitation. The vulnerability is specific to Android devices running the affected versions of the Voice Changer App, which is a consumer-oriented application used for modifying voice recordings or live voice input.
Potential Impact
For European organizations, the direct impact of this vulnerability is likely limited to employees or users who have installed the vulnerable Voice Changer App on their Android devices. If such devices are used within corporate environments, especially those with access to sensitive data or internal networks, the improper export of components could be leveraged by a local attacker or malicious app to escalate privileges, intercept or manipulate data, or disrupt app functionality. This could lead to partial compromise of device confidentiality and integrity, potentially enabling lateral movement or data leakage within corporate networks. However, since exploitation requires local access and the app is consumer-focused, the threat surface is narrower compared to network-exposed vulnerabilities. Still, organizations with Bring Your Own Device (BYOD) policies or those in sectors with high privacy requirements (e.g., finance, healthcare) should be cautious. Additionally, the vulnerability could be used as part of a multi-stage attack chain if combined with other exploits to gain broader access.
Mitigation Recommendations
Organizations should ensure that all Android devices, especially those used in corporate environments, update the Voice Changer App to a patched version once available. Until a patch is released, users should be advised to uninstall the app or restrict its usage on devices that access sensitive information. Mobile Device Management (MDM) solutions can be employed to monitor app installations and enforce policies that prevent installation of vulnerable app versions. Security teams should audit AndroidManifest.xml configurations for in-house or third-party apps to detect improper component exports proactively. Additionally, applying the principle of least privilege on Android devices by disabling installation from untrusted sources and restricting app permissions can reduce the risk. User education about the risks of installing apps from unofficial sources and the importance of updates is also critical. Finally, monitoring for unusual local app interactions or privilege escalations on Android endpoints can help detect exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-29T10:25:30.375Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68b211f4ad5a09ad007b4663
Added to database: 8/29/2025, 8:47:48 PM
Last enriched: 9/7/2025, 12:28:32 AM
Last updated: 10/14/2025, 12:29:26 PM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9437: CWE-755: Improper Handling of Exceptional Conditions in Rockwell Automation ArmorStart AOP
HighPixnapping Attack Steals Data From Google, Samsung Android Phones
MediumWindows 10 Still on Over 40% of Devices as It Reaches End of Support
MediumCVE-2024-54678: CWE-502: Deserialization of Untrusted Data in Siemens SIMATIC PCS neo V4.1
HighCVE-2024-33698: CWE-122: Heap-based Buffer Overflow in Siemens Opcenter Quality
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.