CVE-2013-10064

ActFax Server <5.01 - Buffer Overflow

Title source: llm

Description

A stack-based buffer overflow vulnerability exists in ActFax Server version 5.01. The server's RAW protocol interface fails to safely process user-supplied data in @F506 fax header fields due to insecure usage of strcpy. Remote attackers can exploit this vulnerability by sending specially crafted @F506 fields, potentially leading to arbitrary code execution. Successful exploitation requires network access to TCP port 4559 and does not require authentication.

Exploits (2)

exploitdb WORKING POC VERIFIED
by Craig Freyman · rubyremotewindows
https://www.exploit-db.com/exploits/24467
metasploit WORKING POC NORMAL
by Craig Freyman, corelanc0d3r, juan vazquez · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/misc/actfax_raw_server_bof.rb

Scores

EPSS 0.6383
EPSS Percentile 98.4%

Classification

CWE
CWE-121
Status draft

Timeline

Published Aug 05, 2025
Tracked Since Feb 18, 2026