CVE-2025-30404: ExecuTorch: integer overflow RCE on model load
GHSA-hj95-mhgf-jxc4 CRITICAL CISA: TRACK*Any application loading ExecuTorch models — especially from untrusted or user-supplied sources — is exposed to unauthenticated remote code execution. This is a CVSS 9.8 with no privileges and no user interaction required, making it trivially weaponizable via a crafted model file. Patch to ExecuTorch 0.7.0 immediately and enforce model provenance controls until patched.
Risk Assessment
CVSS 9.8 (AV:N/AC:L/PR:N/UI:N) puts this at maximum exploitability on paper. EPSS is currently very low (0.15%), suggesting no active exploitation detected yet, but the attack surface is broad: any mobile, edge, or server-side AI system that loads .pte model files is potentially reachable. The window between disclosure and weaponized PoC for integer overflow vulnerabilities in memory-unsafe contexts is historically short. Risk is HIGH for organizations running ExecuTorch in production, especially if model loading accepts externally-sourced files.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| executorch | pip | < 0.7.0 | 0.7.0 |
| executorch | pip | < 0.7.0 | 0.7.0 |
| org.pytorch:executorch-android | maven | < 0.7.0 | 0.7.0 |
Severity & Risk
Attack Surface
Recommended Action
5 steps-
PATCH
Upgrade executorch (pip), executorch-android (Maven), or any source build to version 0.7.0 or commit d158236b1dc84539c1b16843bc74054c9dcba006 or later.
-
INVENTORY
Identify all services and mobile apps loading ExecuTorch models, especially those accepting models from external or user-controlled sources.
-
RESTRICT
Until patched, enforce strict model provenance — load only cryptographically signed models from internal registries; reject any externally sourced .pte files.
-
DETECT
Monitor for anomalous crashes or segfaults in model-loading components, which may indicate active probing or exploitation attempts.
-
SBOM
If running a mobile AI product, notify downstream users of the affected Android SDK dependency and release an updated build.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2025-30404?
Any application loading ExecuTorch models — especially from untrusted or user-supplied sources — is exposed to unauthenticated remote code execution. This is a CVSS 9.8 with no privileges and no user interaction required, making it trivially weaponizable via a crafted model file. Patch to ExecuTorch 0.7.0 immediately and enforce model provenance controls until patched.
Is CVE-2025-30404 actively exploited?
No confirmed active exploitation of CVE-2025-30404 has been reported, but organizations should still patch proactively.
How to fix CVE-2025-30404?
1. PATCH: Upgrade executorch (pip), executorch-android (Maven), or any source build to version 0.7.0 or commit d158236b1dc84539c1b16843bc74054c9dcba006 or later. 2. INVENTORY: Identify all services and mobile apps loading ExecuTorch models, especially those accepting models from external or user-controlled sources. 3. RESTRICT: Until patched, enforce strict model provenance — load only cryptographically signed models from internal registries; reject any externally sourced .pte files. 4. DETECT: Monitor for anomalous crashes or segfaults in model-loading components, which may indicate active probing or exploitation attempts. 5. SBOM: If running a mobile AI product, notify downstream users of the affected Android SDK dependency and release an updated build.
What systems are affected by CVE-2025-30404?
This vulnerability affects the following AI/ML architecture patterns: Edge / on-device inference, Mobile AI applications (Android), Model serving pipelines, Model registry / distribution systems, CI/CD model validation pipelines.
What is the CVSS score for CVE-2025-30404?
CVE-2025-30404 has a CVSS v3.1 base score of 9.8 (CRITICAL). The EPSS exploitation probability is 0.24%.
Technical Details
NVD Description
An integer overflow vulnerability in the loading of ExecuTorch models can cause overlapping allocations, potentially resulting in code execution or other undesirable effects. This issue affects ExecuTorch prior to commit d158236b1dc84539c1b16843bc74054c9dcba006.
Exploitation Scenario
An adversary crafts a malicious ExecuTorch model file (.pte) with integer values in the model header carefully chosen to trigger an overflow during allocation size calculation. When the target application loads this file — via a compromised model update server, a malicious model uploaded to a shared registry, or a social-engineered file download — the overflow causes two allocations to occupy overlapping memory regions. The adversary controls the content written to the second allocation, overwriting a function pointer or return address in the first. On next invocation of the corrupted structure, attacker-controlled code executes in the context of the mobile app or inference service. No authentication, credentials, or prior access to the target system is required beyond the ability to deliver the malicious model file.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H References
Timeline
Related Vulnerabilities
CVE-2025-30405 9.8 ExecuTorch: integer overflow in model load → RCE
Same package: executorch CVE-2025-54949 9.8 ExecuTorch: heap buffer overflow RCE via model loading
Same package: executorch CVE-2025-54951 9.8 ExecuTorch: heap buffer overflow RCE in model loading
Same package: executorch CVE-2025-54950 9.8 ExecuTorch: OOB read in model loader enables RCE
Same package: executorch CVE-2025-30402 8.1 ExecuTorch: heap overflow in method load, RCE risk
Same package: executorch
AI Threat Alert