CVE-2025-54481
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A stack-based buffer overflow vulnerability exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted MFER file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability manifests on line 8744 of biosig.c on the current master branch (35a819fa), when the Tag is 3: else if (tag==3) { // character code char v[17]; // [1] if (len>16) fprintf(stderr,"Warning MFER tag2 incorrect length %i>16
",len); curPos += ifread(&v,1,len,hdr); v[len] = 0; In this case, the overflowed buffer is the newly-declared `v` \[1\] instead of `buf`. Since `v` is only 17 bytes large, much smaller values of `len` (even those encoded using a single octet) can trigger an overflow in this code path.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2025-07-23 CVE Reserved
- 2025-08-25 CVE Published
- 2025-08-25 CVE Updated
- 2025-08-26 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-121: Stack-based Buffer Overflow
CAPEC
References (1)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
The Biosig Project Search vendor "The Biosig Project" | Libbiosig Search vendor "The Biosig Project" for product "Libbiosig" | 3.9.0 Search vendor "The Biosig Project" for product "Libbiosig" and version "3.9.0" | en |
Affected
| ||||||
The Biosig Project Search vendor "The Biosig Project" | Libbiosig Search vendor "The Biosig Project" for product "Libbiosig" | <= Search vendor "The Biosig Project" for product "Libbiosig" and version " <= " | en |
Affected
|