RabidHamster R4 v1.25 contains a stack-based buffer overflow vulnerability due to unsafe use of sprintf() when logging malformed HTTP requests. A remote attacker can exploit this flaw by sending a specially crafted URI, resulting in arbitrary code execution under the context of the web server process.
CVSS
No CVSS.
References
Configurations
No configuration.
History
14 Aug 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/rabidhamster_r4_log.rb - |
14 Aug 2025, 13:11
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
13 Aug 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-13 21:15
Updated : 2025-08-14 15:15
NVD link : CVE-2012-10058
Mitre link : CVE-2012-10058
CVE.ORG link : CVE-2012-10058
JSON object : View
Products Affected
No product.
CWE
CWE-121
Stack-based Buffer Overflow