๐Ÿ” CVE Alert

CVE-2013-10064

UNKNOWN 0.0

ActFax 5.01 RAW Server Buffer Overflow

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

A stack-based buffer overflow vulnerability exists in ActFax Server version 5.01. The server's RAW protocol interface fails to safely process user-supplied data in @F506 fax header fields due to insecure usage of strcpy. Remote attackers can exploit this vulnerability by sending specially crafted @F506 fields, potentially leading to arbitrary code execution. Successful exploitation requires network access to TCP port 4559 and does not require authentication.

CWE CWE-121
Vendor actfax communication
Product actfax server
Published Aug 5, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for actfax communication actfax server

Be the first to know when new unknown vulnerabilities affecting actfax communication actfax server are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

ActFax Communication / ActFax Server
5.01

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
actfax.com: http://www.actfax.com/ web.archive.org: https://web.archive.org/web/20130212065755/http://www.pwnag3.com/2013/02/actfax-raw-server-exploit.html raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/misc/actfax_raw_server_bof.rb exploit-db.com: https://www.exploit-db.com/exploits/24467 vulncheck.com: https://www.vulncheck.com/advisories/actfax-raw-server-buffer-overflow

Credits

Craig Freyman