🔐 CVE Alert

CVE-2012-10058

UNKNOWN 0.0

RabidHamster R4 Log Entry sprintf() Buffer Overflow

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

RabidHamster R4 v1.25 contains a stack-based buffer overflow vulnerability due to unsafe use of sprintf() when logging malformed HTTP requests. A remote attacker can exploit this flaw by sending a specially crafted URI, resulting in arbitrary code execution under the context of the web server process.

CWE CWE-121
Vendor rabidhamster
Product r4 embedded server
Published Aug 13, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for rabidhamster r4 embedded server

Be the first to know when new unknown vulnerabilities affecting rabidhamster r4 embedded server are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

RabidHamster / R4 Embedded Server
1.25

References

NVD ↗ CVE.org ↗ EPSS Data ↗
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/rabidhamster_r4_log.rb exploit-db.com: https://www.exploit-db.com/exploits/18929 aluigi.altervista.org: http://aluigi.altervista.org/adv/r4_1-adv.txt advisories.checkpoint.com: https://advisories.checkpoint.com/defense/advisories/public/2013/cpai-07-jan405.html rabidhamster.org: https://www.rabidhamster.org/R4/download.php vulncheck.com: https://www.vulncheck.com/advisories/rabidhamster-r4-log-entry-buffer-overflow

Credits

Luigi Auriemma