Description
LightLLM version 1.1.0 and prior contain an unauthenticated remote code execution vulnerability in PD (prefill-decode) disaggregation mode. The PD master node exposes WebSocket endpoints that receive binary frames and pass the data directly to pickle.loads() without authentication or validation. A remote attacker who can reach the PD master can send a crafted payload to achieve arbitrary code execution.
Problem types
CWE-502 Deserialization of Untrusted Data
Product status
Any version
Credits
Valentin Lobstein (Chocapikk)
References
chocapikk.com/posts/2026/lightllm-pickle-rce/
github.com/ModelTC/LightLLM/issues/1213
lightllm-en.readthedocs.io/en/latest/index.html
github.com/...0b6fbe20aad66c8fe0/lightllm/server/api_http.py
github.com/...0b6fbe20aad66c8fe0/lightllm/server/api_http.py
www.vulncheck.com/...tllm-pd-mode-unsafe-deserialization-rce