Impact
The vulnerability arises from unsafe deserialization of Python pickle data in the reward server component of OmniGen2‑RL. An unauthenticated attacker can send a specially crafted HTTP POST request that triggers the server to unpickle the payload, allowing arbitrary code execution on the host running the service. This is a remote code execution flaw (CWE‑502).
Affected Systems
Affected systems are the OmniGen2‑RL reward server from Beijing Academy of Artificial Intelligence (BAAI). No specific affected version numbers are listed in the input; users should assume all current releases until a patch is released and review the vendor’s advisories.
Risk and Exploitability
The score from CVSS is 9.3, indicating a critical vulnerability. Exploitation requires only an unauthenticated HTTP POST to the exposed endpoint, so the attack surface is high. EPSS data is not available, and the issue is not included in CISA’s KEV catalog, but the nature of the flaw suggests a high likelihood of exploitation if the service is reachable over the network.
OpenCVE Enrichment