{"uuid": "9b09576a-aaa5-46cc-96ec-2025a771befc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27783", "type": "seen", "source": "https://t.me/cvedetector/20673", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27783 - Applio Voice Conversion Tool Remote Code Execution and Arbitrary File Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27783 \nPublished : March 19, 2025, 9:15 p.m. | 15\u00a0minutes ago \nDescription : Applio is a voice conversion tool. Versions 3.2.8-bugfix and prior are vulnerable to arbitrary file write in train.py. This issue may lead to writing arbitrary files on the Applio server. It can also be used in conjunction with an unsafe deserialization to achieve remote code execution. As of time of publication, no known patches are available. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-19T23:00:22.000000Z"}