CVE-2012-10058
CRITICALRabidHamster R4 v1.25 - Buffer Overflow
Title source: llmDescription
RabidHamster R4 v1.25 contains a stack-based buffer overflow vulnerability due to unsafe use of sprintf() when logging malformed HTTP requests. A remote attacker can exploit this flaw by sending a specially crafted URI, resulting in arbitrary code execution under the context of the web server process.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/18929
metasploit
WORKING POC
NORMAL
by Luigi Auriemma, sinn3r · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/rabidhamster_r4_log.rb
References (6)
Scores
CVSS v4
10.0
EPSS
0.5470
EPSS Percentile
98.0%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-121
Status
published
Products (1)
RabidHamster/R4 Embedded Server
1.25
Published
Aug 13, 2025
Tracked Since
Feb 18, 2026