The vulnerability exists in the load method of the InspireModel class, located in inspiremusic/cli/model.py. This method is responsible for loading model weights from files. The core issue is the use of torch.load for deserializing these model files without setting the weights_only=True parameter. By default, or when weights_only=False, torch.load uses Python's pickle module, which is known to be unsafe when loading data from untrusted sources as it can lead to arbitrary code execution. In this case, if an attacker can provide a maliciously crafted model file, the torch.load function will execute embedded code during deserialization. The deserialized (and potentially malicious) data is then passed to the load_state_dict method of the respective model components (self.llm and self.flow). The patch addresses this by adding weights_only=True to the torch.load calls, which restricts torch.load to only loading tensors and not arbitrary pickled objects, thus preventing the deserialization vulnerability.