CVE-2025-9675
📋 TL;DR
This vulnerability in Voice Changer App allows improper export of Android application components via manipulation of AndroidManifest.xml. Attackers can exploit this to launch attacks from the local host, potentially accessing sensitive app data or functionality. Users of Voice Changer App versions up to 1.1.0 on Android devices are affected.
💻 Affected Systems
- Voice Changer App
📦 What is this software?
Voice Changer by Voice Changer Project
⚠️ Risk & Real-World Impact
Worst Case
Local attackers could access sensitive app data, execute unauthorized actions within the app, or potentially escalate privileges on the device.
Likely Case
Unauthorized access to app components leading to data leakage or manipulation of app functionality.
If Mitigated
Limited impact with proper Android permission controls and app sandboxing in place.
🎯 Exploit Status
Exploit details are publicly disclosed and local access is sufficient for exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None known
Restart Required: No
Instructions:
No official patch available. Uninstall vulnerable versions and monitor for updates from the app developer.
🔧 Temporary Workarounds
Uninstall vulnerable app
androidRemove the vulnerable Voice Changer App from affected devices
adb uninstall com.tuyangkeji.changevoice
🧯 If You Can't Patch
- Restrict app installation permissions to prevent malicious apps from exploiting this vulnerability
- Use Android work profiles or containerization to isolate vulnerable apps
🔍 How to Verify
Check if Vulnerable:
Check app version in Android settings > Apps > Voice Changer App. Versions 1.1.0 or earlier are vulnerable.
Check Version:
adb shell dumpsys package com.tuyangkeji.changevoice | grep versionName
Verify Fix Applied:
Verify app is uninstalled or updated to a version above 1.1.0 (if available).
📡 Detection & Monitoring
Log Indicators:
- Unusual activity from Voice Changer App process
- Permission violations related to com.tuyangkeji.changevoice
Network Indicators:
- Local inter-process communication attempts to vulnerable app components
SIEM Query:
process_name:"com.tuyangkeji.changevoice" AND (event_type:"permission_violation" OR event_type:"unauthorized_access")
🔗 References
- https://github.com/KMov-g/androidapps/blob/main/com.tuyangkeji.changevoice.md
- https://github.com/KMov-g/androidapps/blob/main/com.tuyangkeji.changevoice.md#steps-to-reproduce
- https://vuldb.com/?ctiid.321887
- https://vuldb.com/?id.321887
- https://vuldb.com/?submit.638073
- https://github.com/KMov-g/androidapps/blob/main/com.tuyangkeji.changevoice.md
- https://github.com/KMov-g/androidapps/blob/main/com.tuyangkeji.changevoice.md#steps-to-reproduce