RabidHamster.R4.Client.Request.Handling.Buffer.Overflow
Description
This indicates an attack attempt against a Buffer Overflow vulnerability in RabidHamster R4.
The vulnerability is caused by an error when handling the malicious "miniscreenshot" command or overlong uri. It allows a remote attacker to execute arbitrary code by sending a crafted HTTP request.
Affected Products
RabidHamster R4 1.25
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Currently we are not aware of any vendor supplied patch for this issue.
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |