VisiCut 2.1 allows code execution via Insecure XML Deserialization in the loadPlfFile method of VisicutModel.java.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://github.com/t-oster/VisiCut | product |
https://royblume.github.io/CVE-2025-25940/ | exploit third party advisory |