CVE-2025-13710: CWE-502: Deserialization of Untrusted Data in Tencent HunyuanVideo
Tencent HunyuanVideo load_vae Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent HunyuanVideo. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the load_vae function.The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-27186.
AI Analysis
Technical Summary
CVE-2025-13710 is a vulnerability in Tencent HunyuanVideo's load_vae function, where improper validation of user-supplied data leads to deserialization of untrusted input. Deserialization vulnerabilities occur when untrusted data is processed by a program expecting serialized objects, potentially allowing attackers to craft malicious payloads that execute arbitrary code during the deserialization process. In this case, the vulnerability enables remote attackers to execute code with root privileges, significantly elevating the threat level. Exploitation requires user interaction, such as opening a malicious file or visiting a crafted webpage, which triggers the vulnerable deserialization routine. The vulnerability is classified under CWE-502, which pertains to unsafe deserialization. The CVSS v3.0 score of 7.8 indicates a high severity, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No patches are currently listed, and no known exploits have been observed in the wild, but the potential for severe damage exists due to root-level code execution. Tencent HunyuanVideo is a video processing product, likely used in media and enterprise environments, which increases the risk of sensitive data exposure or disruption of critical services if exploited.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial. Successful exploitation could lead to full system compromise with root privileges, allowing attackers to steal sensitive data, disrupt video processing services, or use compromised systems as footholds for lateral movement within networks. Organizations in media, entertainment, and any sectors relying on Tencent HunyuanVideo for video processing or streaming are particularly vulnerable. The requirement for user interaction somewhat limits mass exploitation but does not eliminate risk, especially in environments where users may be targeted with phishing or social engineering attacks. Confidentiality, integrity, and availability of affected systems are all at high risk, potentially leading to data breaches, service outages, and reputational damage. Given the high CVSS score and root-level code execution, the vulnerability represents a critical risk to operational continuity and data security in European enterprises using this software.
Mitigation Recommendations
1. Monitor Tencent’s official channels for patches and apply them immediately once available to remediate the vulnerability. 2. Until patches are released, restrict or disable the use of the load_vae function if possible, or isolate systems running Tencent HunyuanVideo to limit exposure. 3. Implement strict input validation and sanitization at the application layer to prevent untrusted data from reaching the deserialization routines. 4. Employ application whitelisting and endpoint protection solutions capable of detecting anomalous deserialization behavior or code execution attempts. 5. Educate users about the risks of opening files or clicking links from untrusted sources to reduce the likelihood of successful exploitation via user interaction. 6. Use network segmentation and firewall rules to limit access to systems running HunyuanVideo, reducing the attack surface. 7. Enable logging and monitoring for unusual activity related to deserialization processes and privilege escalations to detect potential exploitation attempts early.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-13710: CWE-502: Deserialization of Untrusted Data in Tencent HunyuanVideo
Description
Tencent HunyuanVideo load_vae Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent HunyuanVideo. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the load_vae function.The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-27186.
AI-Powered Analysis
Technical Analysis
CVE-2025-13710 is a vulnerability in Tencent HunyuanVideo's load_vae function, where improper validation of user-supplied data leads to deserialization of untrusted input. Deserialization vulnerabilities occur when untrusted data is processed by a program expecting serialized objects, potentially allowing attackers to craft malicious payloads that execute arbitrary code during the deserialization process. In this case, the vulnerability enables remote attackers to execute code with root privileges, significantly elevating the threat level. Exploitation requires user interaction, such as opening a malicious file or visiting a crafted webpage, which triggers the vulnerable deserialization routine. The vulnerability is classified under CWE-502, which pertains to unsafe deserialization. The CVSS v3.0 score of 7.8 indicates a high severity, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No patches are currently listed, and no known exploits have been observed in the wild, but the potential for severe damage exists due to root-level code execution. Tencent HunyuanVideo is a video processing product, likely used in media and enterprise environments, which increases the risk of sensitive data exposure or disruption of critical services if exploited.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial. Successful exploitation could lead to full system compromise with root privileges, allowing attackers to steal sensitive data, disrupt video processing services, or use compromised systems as footholds for lateral movement within networks. Organizations in media, entertainment, and any sectors relying on Tencent HunyuanVideo for video processing or streaming are particularly vulnerable. The requirement for user interaction somewhat limits mass exploitation but does not eliminate risk, especially in environments where users may be targeted with phishing or social engineering attacks. Confidentiality, integrity, and availability of affected systems are all at high risk, potentially leading to data breaches, service outages, and reputational damage. Given the high CVSS score and root-level code execution, the vulnerability represents a critical risk to operational continuity and data security in European enterprises using this software.
Mitigation Recommendations
1. Monitor Tencent’s official channels for patches and apply them immediately once available to remediate the vulnerability. 2. Until patches are released, restrict or disable the use of the load_vae function if possible, or isolate systems running Tencent HunyuanVideo to limit exposure. 3. Implement strict input validation and sanitization at the application layer to prevent untrusted data from reaching the deserialization routines. 4. Employ application whitelisting and endpoint protection solutions capable of detecting anomalous deserialization behavior or code execution attempts. 5. Educate users about the risks of opening files or clicking links from untrusted sources to reduce the likelihood of successful exploitation via user interaction. 6. Use network segmentation and firewall rules to limit access to systems running HunyuanVideo, reducing the attack surface. 7. Enable logging and monitoring for unusual activity related to deserialization processes and privilege escalations to detect potential exploitation attempts early.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- zdi
- Date Reserved
- 2025-11-25T21:52:45.860Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 694b0d93d69af40f312d386e
Added to database: 12/23/2025, 9:45:55 PM
Last enriched: 12/30/2025, 11:55:36 PM
Last updated: 2/7/2026, 1:29:48 PM
Views: 28
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.