RabidHamster R2 is prone to an overflow condition. The 'file' command fails to properly sanitize user-supplied input resulting in a stack-based buffer overflow. With a specially crafted request containing an overly long file parameter, a remote attacker can potentially cause arbitrary code execution.
Remote / Network Access
Loss of Integrity
OSVDB is not aware of a solution for this vulnerability.