CVE-2013-10064
ActFax Server <5.01 - Buffer Overflow
Title source: llmDescription
A stack-based buffer overflow vulnerability exists in ActFax Server version 5.01. The server's RAW protocol interface fails to safely process user-supplied data in @F506 fax header fields due to insecure usage of strcpy. Remote attackers can exploit this vulnerability by sending specially crafted @F506 fields, potentially leading to arbitrary code execution. Successful exploitation requires network access to TCP port 4559 and does not require authentication.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Craig Freyman · rubyremotewindows
https://www.exploit-db.com/exploits/24467
metasploit
WORKING POC
NORMAL
by Craig Freyman, corelanc0d3r, juan vazquez · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/misc/actfax_raw_server_bof.rb
References (5)
Scores
EPSS
0.6383
EPSS Percentile
98.4%
Classification
CWE
CWE-121
Status
draft
Timeline
Published
Aug 05, 2025
Tracked Since
Feb 18, 2026