Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-31168 | A security vulnerability has been detected in LazyAGI LazyLLM up to 0.6.1. Affected by this issue is the function lazyllm_call of the file lazyllm/components/deploy/relay/server.py. Such manipulation leads to deserialization. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. |
Fri, 26 Sep 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 26 Sep 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lazyagi
Lazyagi lazyllm |
|
| Vendors & Products |
Lazyagi
Lazyagi lazyllm |
Thu, 25 Sep 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security vulnerability has been detected in LazyAGI LazyLLM up to 0.6.1. Affected by this issue is the function lazyllm_call of the file lazyllm/components/deploy/relay/server.py. Such manipulation leads to deserialization. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. | |
| Title | LazyAGI LazyLLM server.py lazyllm_call deserialization | |
| Weaknesses | CWE-20 CWE-502 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-09-26T17:56:55.163Z
Reserved: 2025-09-25T10:11:23.733Z
Link: CVE-2025-10965
Updated: 2025-09-26T17:38:23.374Z
Status : Deferred
Published: 2025-09-25T20:15:34.483
Modified: 2026-04-29T01:00:01.613
Link: CVE-2025-10965
No data.
OpenCVE Enrichment
Updated: 2025-09-26T11:35:29Z
EUVD