CVE-2026-7301
SGLangs · Multimodal Generation Runtime
The SGLangs scheduler binds its ROUTER socket to 0.0.0.0 and performs unsafe pickle deserialization on incoming messages, enabling unauthenticated remote code execution.
Executive summary
A critical vulnerability in the SGLangs runtime scheduler allows unauthenticated attackers to execute arbitrary code by sending malicious packets to the exposed ROUTER socket.
Vulnerability
By binding to all interfaces and using pickle.loads() on untrusted input, the scheduler creates an exploitable attack surface for any remote actor capable of reaching the socket.
Business impact
The CVSS score of 9.8 underscores the severity of this remote code execution flaw. If the service is exposed to the internet, it provides an immediate vector for full system compromise, data theft, and persistent unauthorized access.
Remediation
Immediate Action: Bind the ROUTER socket to 'localhost' (127.0.0.1) and update to the latest patched version.
Proactive Monitoring: Use network monitoring tools to ensure the ROUTER socket is not accessible from external, untrusted networks.
Compensating Controls: Place the service behind a restrictive firewall or VPN, ensuring it is not reachable from the public internet.
Exploitation status
Public Exploit Available: No