CVE-2012-10058

RabidHamster R4 v1.25 contains a stack-based buffer overflow vulnerability due to unsafe use of sprintf() when logging malformed HTTP requests. A remote attacker can exploit this flaw by sending a specially crafted URI, resulting in arbitrary code execution under the context of the web server process.
CVSS

No CVSS.

Configurations

No configuration.

History

14 Aug 2025, 15:15

Type Values Removed Values Added
References () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/rabidhamster_r4_log.rb - () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/rabidhamster_r4_log.rb -

14 Aug 2025, 13:11

Type Values Removed Values Added
Summary
  • (es) RabidHamster R4 v1.25 contiene una vulnerabilidad de desbordamiento de búfer en la pila debido al uso inseguro de sprintf() al registrar solicitudes HTTP malformadas. Un atacante remoto puede explotar esta vulnerabilidad enviando una URI especialmente manipulada, lo que provoca la ejecución de código arbitrario en el contexto del proceso del servidor web.

13 Aug 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-13 21:15

Updated : 2025-08-14 15:15


NVD link : CVE-2012-10058

Mitre link : CVE-2012-10058

CVE.ORG link : CVE-2012-10058


JSON object : View

Products Affected

No product.

CWE
CWE-121

Stack-based Buffer Overflow