Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13713: CWE-502: Deserialization of Untrusted Data in Tencent Hunyuan3D-1

0
High
VulnerabilityCVE-2025-13713cvecve-2025-13713cwe-502
Published: Tue Dec 23 2025 (12/23/2025, 21:33:23 UTC)
Source: CVE Database V5
Vendor/Project: Tencent
Product: Hunyuan3D-1

Description

Tencent Hunyuan3D-1 load_pretrained Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent Hunyuan3D-1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the load_pretrained function. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-27191.

AI-Powered Analysis

AILast updated: 12/23/2025, 22:01:21 UTC

Technical Analysis

CVE-2025-13713 is a deserialization of untrusted data vulnerability (CWE-502) found in Tencent's Hunyuan3D-1 product, specifically within the load_pretrained function. This function improperly handles user-supplied data without adequate validation, allowing attackers to craft malicious serialized objects. When such data is deserialized, it can trigger arbitrary code execution in the context of the root user, effectively granting full control over the affected system. The attack vector requires local access or user interaction, such as opening a malicious file or visiting a specially crafted web page. The vulnerability was assigned a CVSS v3.0 score of 7.8, indicating high severity with attack vector local, low attack complexity, no privileges required, but user interaction necessary. The flaw was reported by ZDI (ZDI-CAN-27191) and published in late 2025. No public exploits have been observed yet, but the potential for remote code execution with root privileges makes this a critical risk for affected environments. The lack of patches at the time of reporting increases the urgency for mitigation.

Potential Impact

For European organizations, this vulnerability poses a significant threat to systems running Tencent Hunyuan3D-1, particularly those involved in AI, 3D modeling, or related research and development. Successful exploitation can lead to complete system compromise, data theft, manipulation, or destruction, and disruption of critical services. The root-level code execution means attackers can bypass most security controls, implant persistent malware, or pivot within networks. Given the user interaction requirement, phishing or social engineering campaigns could be used to trigger exploitation. The impact extends to intellectual property loss, operational downtime, and potential regulatory penalties under GDPR if sensitive data is compromised. Organizations relying on this software for production or research should consider the vulnerability a high priority for remediation to avoid severe confidentiality, integrity, and availability breaches.

Mitigation Recommendations

1. Immediately monitor for updates or patches from Tencent and apply them as soon as available. 2. Until patches are released, restrict access to the load_pretrained functionality and limit exposure of the software to untrusted users or networks. 3. Implement strict input validation and sanitization on any data processed by load_pretrained to prevent deserialization of malicious objects. 4. Educate users about the risks of opening untrusted files or visiting suspicious websites to reduce the likelihood of user interaction exploitation. 5. Employ application whitelisting and endpoint detection and response (EDR) solutions to detect and block suspicious activities related to deserialization attacks. 6. Use network segmentation to isolate systems running Hunyuan3D-1 from critical infrastructure. 7. Conduct regular security audits and penetration testing focusing on deserialization vulnerabilities and user interaction attack vectors. 8. Monitor logs for unusual deserialization or execution patterns indicative of exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
zdi
Date Reserved
2025-11-25T21:53:02.469Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 694b0d95d69af40f312d38a2

Added to database: 12/23/2025, 9:45:57 PM

Last enriched: 12/23/2025, 10:01:21 PM

Last updated: 12/24/2025, 1:10:44 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats