Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-26210— KTransformers Unsafe Deserialization RCE via balance_serve

CVSS 9.8 · Critical EPSS 0.07% · P22
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-26210

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
KTransformers Unsafe Deserialization RCE via balance_serve
Source: NVD (National Vulnerability Database)
Vulnerability Description
KTransformers through 0.5.3 contains an unsafe deserialization vulnerability in the balance_serve backend mode where the scheduler RPC server binds a ZMQ ROUTER socket to all interfaces with no authentication and deserializes incoming messages using pickle.loads() without validation. Attackers can send a crafted pickle payload to the exposed ZMQ socket to execute arbitrary code on the server with the privileges of the ktransformers process.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
可信数据的反序列化
Source: NVD (National Vulnerability Database)
Vulnerability Title
ktransformers 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
ktransformers是kvcache.ai开源的一个CPU-GPU异构大模型推理与微调框架。 KTransformers 0.5.3及之前版本存在代码问题漏洞,该漏洞源于balance_serve后端模式中的不安全反序列化,其中调度器RPC服务器将ZMQ ROUTER套接字绑定到所有接口且无身份验证,并使用pickle.loads()反序列化传入消息,允许攻击者发送特制pickle有效载荷执行任意代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
kvcache-aiktransformers 0 ~ 0.5.3 -

II. Public POCs for CVE-2026-26210

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-26210

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2026-26210

No comments yet


Leave a comment