CVE-2012-10058
RabidHamster R4 Log Entry sprintf() Buffer Overflow
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
RabidHamster R4 v1.25 contains a stack-based buffer overflow vulnerability due to unsafe use of sprintf() when logging malformed HTTP requests. A remote attacker can exploit this flaw by sending a specially crafted URI, resulting in arbitrary code execution under the context of the web server process.
| CWE | CWE-121 |
| Vendor | rabidhamster |
| Product | r4 embedded server |
| Published | Aug 13, 2025 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for rabidhamster r4 embedded server
Be the first to know when new unknown vulnerabilities affecting rabidhamster r4 embedded server are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
Affected Versions
RabidHamster / R4 Embedded Server
1.25
References
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/rabidhamster_r4_log.rb exploit-db.com: https://www.exploit-db.com/exploits/18929 aluigi.altervista.org: http://aluigi.altervista.org/adv/r4_1-adv.txt advisories.checkpoint.com: https://advisories.checkpoint.com/defense/advisories/public/2013/cpai-07-jan405.html rabidhamster.org: https://www.rabidhamster.org/R4/download.php vulncheck.com: https://www.vulncheck.com/advisories/rabidhamster-r4-log-entry-buffer-overflow
Credits
Luigi Auriemma