RabidHamster R4 v1.25 contains a stack-based buffer overflow vulnerability due to unsafe use of sprintf() when logging malformed HTTP requests. A remote attacker can exploit this flaw by sending a specially crafted URI, resulting in arbitrary code execution under the context of the web server process.
Metrics
Affected Vendors & Products
References
History
Thu, 14 Aug 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 13 Aug 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | RabidHamster R4 v1.25 contains a stack-based buffer overflow vulnerability due to unsafe use of sprintf() when logging malformed HTTP requests. A remote attacker can exploit this flaw by sending a specially crafted URI, resulting in arbitrary code execution under the context of the web server process. | |
Title | RabidHamster R4 Log Entry sprintf() Buffer Overflow | |
Weaknesses | CWE-121 | |
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-08-13T20:52:07.004Z
Updated: 2025-08-14T14:52:24.644Z
Reserved: 2025-08-11T19:17:28.541Z
Link: CVE-2012-10058

Updated: 2025-08-14T13:46:23.829Z

Status : Awaiting Analysis
Published: 2025-08-13T21:15:30.290
Modified: 2025-08-14T15:15:31.023
Link: CVE-2012-10058

No data.