Description

LightLLM version 1.1.0 and prior contain an unauthenticated remote code execution vulnerability in PD (prefill-decode) disaggregation mode. The PD master node exposes WebSocket endpoints that receive binary frames and pass the data directly to pickle.loads() without authentication or validation. A remote attacker who can reach the PD master can send a crafted payload to achieve arbitrary code execution.

INFO

Published Date :

2026-02-17T01:52:03.650Z

Last Modified :

2026-02-17T14:37:46.080Z

Source :

VulnCheck
AFFECTED PRODUCTS

The following products are affected by CVE-2026-26220 vulnerability.

Vendors Products
Modeltc
  • Lightllm

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability