Home

Description

RabidHamster R4 v1.25 contains a stack-based buffer overflow vulnerability due to unsafe use of sprintf() when logging malformed HTTP requests. A remote attacker can exploit this flaw by sending a specially crafted URI, resulting in arbitrary code execution under the context of the web server process.

PUBLISHED Reserved 2025-08-11 | Published 2025-08-13 | Updated 2025-08-14 | Assigner VulnCheck




CRITICAL: 10.0CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-121 Stack-based Buffer Overflow

Product status

Default status
unknown

1.25
affected

Credits

Luigi Auriemma finder

References

raw.githubusercontent.com/...ows/http/rabidhamster_r4_log.rb exploit

www.exploit-db.com/exploits/18929 exploit

aluigi.altervista.org/adv/r4_1-adv.txt technical-description exploit

advisories.checkpoint.com/...public/2013/cpai-07-jan405.html third-party-advisory

www.rabidhamster.org/R4/download.php product

www.vulncheck.com/...bidhamster-r4-log-entry-buffer-overflow third-party-advisory

cve.org (CVE-2012-10058)

nvd.nist.gov (CVE-2012-10058)

Download JSON