← Voltar para CVEs
CVE-2026-26220
N/ADescricao
LightLLM version 1.1.0 and prior contain an unauthenticated remote code execution vulnerability in PD (prefill-decode) disaggregation mode. The PD master node exposes WebSocket endpoints that receive binary frames and pass the data directly to pickle.loads() without authentication or validation. A remote attacker who can reach the PD master can send a crafted payload to achieve arbitrary code execution.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado2/17/2026
Ultima modificacao2/18/2026
Fontenvd
Avistamentos honeypot0
Fraquezas (CWE)
CWE-502
Referencias
https://chocapikk.com/posts/2026/lightllm-pickle-rce/(disclosure@vulncheck.com)
https://github.com/ModelTC/LightLLM/issues/1213(disclosure@vulncheck.com)
https://github.com/ModelTC/lightllm/blob/a27dfc88c2144ed51a6e160b6fbe20aad66c8fe0/lightllm/server/api_http.py#L310(disclosure@vulncheck.com)
https://github.com/ModelTC/lightllm/blob/a27dfc88c2144ed51a6e160b6fbe20aad66c8fe0/lightllm/server/api_http.py#L331(disclosure@vulncheck.com)
https://lightllm-en.readthedocs.io/en/latest/index.html(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/lightllm-pd-mode-unsafe-deserialization-rce(disclosure@vulncheck.com)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.