CVE-2025-13713

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code as root on systems running vulnerable versions of Tencent Hunyuan3D-1. Attackers can exploit this by tricking users into visiting malicious web pages or opening malicious files. The vulnerability affects installations where the load_pretrained function processes untrusted data.

💻 Affected Systems

Products:
  • Tencent Hunyuan3D-1
Versions: Versions prior to commit 454284503670312d4e06f6251c9be2f9f6d0fae7
Operating Systems: All platforms running Hunyuan3D-1
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the load_pretrained function which handles model loading. Any application using this function with untrusted input is vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with root-level code execution, leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Attacker gains initial foothold with root privileges, enabling lateral movement, credential harvesting, and deployment of additional malware.

🟢

If Mitigated

Attack fails due to proper input validation or restricted execution environment, resulting in denial of service at most.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

User interaction required (visiting malicious page or opening malicious file). The ZDI advisory suggests exploit development is feasible given the deserialization flaw.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Commit 454284503670312d4e06f6251c9be2f9f6d0fae7 and later

Vendor Advisory: https://github.com/Tencent-Hunyuan/Hunyuan3D-1/commit/454284503670312d4e06f6251c9be2f9f6d0fae7

Restart Required: Yes

Instructions:

1. Update to the latest version of Hunyuan3D-1 from the official GitHub repository. 2. Replace the vulnerable load_pretrained function implementation with the patched version. 3. Restart any services or applications using Hunyuan3D-1.

🔧 Temporary Workarounds

Input Validation Wrapper

all

Implement strict input validation before passing data to load_pretrained function

# Custom validation logic required based on application

Network Segmentation

all

Isolate systems running Hunyuan3D-1 from untrusted networks

# Use firewall rules to restrict network access

🧯 If You Can't Patch

  • Implement strict file integrity monitoring on Hunyuan3D-1 installation directories
  • Deploy application allowlisting to prevent execution of unauthorized code

🔍 How to Verify

Check if Vulnerable:

Check if your Hunyuan3D-1 version includes commit 454284503670312d4e06f6251c9be2f9f6d0fae7. If not, you are vulnerable.

Check Version:

git log --oneline | grep -i "4542845" or check version metadata in the software

Verify Fix Applied:

Verify the load_pretrained function includes proper input validation and safe deserialization practices.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process spawning from Hunyuan3D-1
  • Failed deserialization attempts
  • Unexpected network connections from Hunyuan3D-1 processes

Network Indicators:

  • Outbound connections to suspicious IPs from Hunyuan3D-1
  • Unusual data exfiltration patterns

SIEM Query:

process_name:"Hunyuan3D-1" AND (parent_process:unusual OR cmdline:contains("load_pretrained"))

🔗 References

📤 Share & Export