RabidHamster R4 v1.25 contains a stack-based buffer overflow vulnerability due to unsafe use of sprintf() when logging malformed HTTP requests. A remote attacker can exploit this flaw by sending a specially crafted URI, resulting in arbitrary code execution under the context of the web server process.
Advisories
Source ID Title
EUVD EUVD EUVD-2012-6602 RabidHamster R4 v1.25 contains a stack-based buffer overflow vulnerability due to unsafe use of sprintf() when logging malformed HTTP requests. A remote attacker can exploit this flaw by sending a specially crafted URI, resulting in arbitrary code execution under the context of the web server process.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 14 Aug 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 13 Aug 2025 21:00:00 +0000

Type Values Removed Values Added
Description RabidHamster R4 v1.25 contains a stack-based buffer overflow vulnerability due to unsafe use of sprintf() when logging malformed HTTP requests. A remote attacker can exploit this flaw by sending a specially crafted URI, resulting in arbitrary code execution under the context of the web server process.
Title RabidHamster R4 Log Entry sprintf() Buffer Overflow
Weaknesses CWE-121
References
Metrics cvssV4_0

{'score': 10, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-08-14T14:52:24.644Z

Reserved: 2025-08-11T19:17:28.541Z

Link: CVE-2012-10058

cve-icon Vulnrichment

Updated: 2025-08-14T13:46:23.829Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-13T21:15:30.290

Modified: 2025-08-14T15:15:31.023

Link: CVE-2012-10058

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.