Description
KTransformers through 0.5.3 contains an unsafe deserialization vulnerability in the balance_serve backend mode where the scheduler RPC server binds a ZMQ ROUTER socket to all interfaces with no authentication and deserializes incoming messages using pickle.loads() without validation. Attackers can send a crafted pickle payload to the exposed ZMQ socket to execute arbitrary code on the server with the privileges of the ktransformers process.
Problem types
CWE-502 Deserialization of Untrusted Data
Product status
Any version
Credits
Valentin Lobstein (Chocapikk)
References
chocapikk.com/posts/2026/ktransformers-pickle-rce/
github.com/kvcache-ai/ktransformers/pull/1944
www.vulncheck.com/...e-deserialization-rce-via-balance-serve