Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13707: CWE-502: Deserialization of Untrusted Data in Tencent HunyuanDiT

0
High
VulnerabilityCVE-2025-13707cvecve-2025-13707cwe-502
Published: Tue Dec 23 2025 (12/23/2025, 21:33:35 UTC)
Source: CVE Database V5
Vendor/Project: Tencent
Product: HunyuanDiT

Description

Tencent HunyuanDiT model_resume Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent HunyuanDiT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the model_resume function. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-27183.

AI-Powered Analysis

AILast updated: 12/30/2025, 23:55:02 UTC

Technical Analysis

CVE-2025-13707 is a vulnerability identified in Tencent's HunyuanDiT product, specifically within the model_resume function, where deserialization of untrusted data occurs without proper validation. Deserialization vulnerabilities arise when software deserializes data from untrusted sources, potentially allowing attackers to craft malicious input that, when deserialized, executes arbitrary code. In this case, the flaw allows remote attackers to execute code with root privileges, significantly elevating the threat level. Exploitation requires user interaction, such as visiting a malicious webpage or opening a malicious file, which triggers the vulnerable deserialization process. The vulnerability is classified under CWE-502 (Deserialization of Untrusted Data) and was assigned CVE-2025-13707 with a CVSS v3.0 score of 7.8, indicating high severity. The attack vector is local (AV:L), meaning the attacker must have some form of local access or user interaction, but no privileges are required (PR:N). The vulnerability impacts confidentiality, integrity, and availability (all rated high). No patches are currently linked, and no known exploits are reported in the wild, but the potential for severe damage exists due to root-level code execution. The vulnerability was publicly disclosed on December 23, 2025, by ZDI (Zero Day Initiative) under the identifier ZDI-CAN-27183.

Potential Impact

For European organizations, the impact of CVE-2025-13707 can be severe. Successful exploitation allows attackers to execute arbitrary code with root privileges, potentially leading to full system compromise. This can result in data breaches, unauthorized access to sensitive information, disruption of services, and lateral movement within networks. Organizations relying on Tencent HunyuanDiT for critical operations, especially in sectors like finance, telecommunications, and government, face heightened risks. The requirement for user interaction reduces the likelihood of automated widespread exploitation but does not eliminate targeted attacks, especially spear-phishing or malicious document campaigns. The high confidentiality, integrity, and availability impact means that compromised systems could lead to significant operational and reputational damage. Additionally, the lack of available patches increases exposure time, necessitating immediate mitigation efforts.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting user interaction vectors: educate users to avoid opening untrusted files or visiting suspicious websites related to Tencent HunyuanDiT usage. 2. Implement network-level protections such as web filtering and email scanning to block malicious payloads that could trigger the vulnerability. 3. Employ application whitelisting and sandboxing to limit the execution context of the HunyuanDiT application and reduce the impact of potential code execution. 4. Monitor logs and system behavior for unusual activities indicative of exploitation attempts, such as unexpected process spawning or privilege escalations. 5. Since no official patches are currently available, consider isolating or limiting access to systems running vulnerable versions of HunyuanDiT, especially those with root-level privileges. 6. Engage with Tencent for updates and apply patches as soon as they are released. 7. Review and harden deserialization processes in custom integrations or configurations related to HunyuanDiT to ensure input validation and integrity checks are in place.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
zdi
Date Reserved
2025-11-25T21:52:34.817Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 694b0d93d69af40f312d3862

Added to database: 12/23/2025, 9:45:55 PM

Last enriched: 12/30/2025, 11:55:02 PM

Last updated: 2/7/2026, 1:30:24 PM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats