Submeter #652936: LazyAGI LazyLLM latest Remote Code Executioninformação

TítuloLazyAGI LazyLLM latest Remote Code Execution
Descrição### Summary Remote Code Execution Through Insecure Deserialization. ### Details The routing processing function `lazyllm_call` has a deserialization vulnerability in the file [lazyllm/components/deploy/relay/server.py](https://github.com/LazyAGI/LazyLLM/blob/main/lazyllm/components/deploy/relay/server.py#L60-L70). The specific location calls `load_obj->cloudpickle.loads`, which leads to RCE.
Fonte⚠️ https://github.com/LazyAGI/LazyLLM/issues/764
Utilizador
 0x1f (UID 89432)
Submissão11/09/2025 19h53 (há 8 meses)
Moderação25/09/2025 12h11 (14 days later)
EstadoAceite
Entrada VulDB325833 [LazyAGI LazyLLM até 0.6.1 server.py lazyllm_call Elevação de Privilégios]
Pontos20

Want to know what is going to be exploited?

We predict KEV entries!