CVE-2026-26220
LightLLM version 1.1.0 and prior contain an unauthenticated remote code execution vulnerability in PD (prefill-decode) disaggregation mode. The PD master node exposes WebSocket endpoints that receive binary frames and pass the data directly to pickle.loads() without authentication or validation. A remote attacker who can reach the PD master can send a crafted payload to achieve arbitrary code execution.
Vendor
-
Product
-
CWE
Yayın Tarihi
2026-02-17 03:16:01
Güncelleme
2026-02-18 17:52:22
Source Identifier
disclosure@vulncheck.com
KEV Date Added
-
Kategoriler
Referanslar
https://chocapikk.com/posts/2026/lightllm-pickle-rce/
https://github.com/ModelTC/LightLLM/issues/1213
https://github.com/ModelTC/lightllm/blob/a27dfc88c2144ed51a6e160b6fbe20aad66c8fe0/lightllm/server/api_http.py#L310
https://github.com/ModelTC/lightllm/blob/a27dfc88c2144ed51a6e160b6fbe20aad66c8fe0/lightllm/server/api_http.py#L331
https://lightllm-en.readthedocs.io/en/latest/index.html
https://www.vulncheck.com/advisories/lightllm-pd-mode-unsafe-deserialization-rce