CVE-2013-10064
ActFax 5.01 RAW Server Buffer Overflow
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
A stack-based buffer overflow vulnerability exists in ActFax Server version 5.01. The server's RAW protocol interface fails to safely process user-supplied data in @F506 fax header fields due to insecure usage of strcpy. Remote attackers can exploit this vulnerability by sending specially crafted @F506 fields, potentially leading to arbitrary code execution. Successful exploitation requires network access to TCP port 4559 and does not require authentication.
| CWE | CWE-121 |
| Vendor | actfax communication |
| Product | actfax server |
| Published | Aug 5, 2025 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for actfax communication actfax server
Be the first to know when new unknown vulnerabilities affecting actfax communication actfax server are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
ActFax Communication / ActFax Server
5.01
References
actfax.com: http://www.actfax.com/ web.archive.org: https://web.archive.org/web/20130212065755/http://www.pwnag3.com/2013/02/actfax-raw-server-exploit.html raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/misc/actfax_raw_server_bof.rb exploit-db.com: https://www.exploit-db.com/exploits/24467 vulncheck.com: https://www.vulncheck.com/advisories/actfax-raw-server-buffer-overflow
Credits
Craig Freyman