CVE-2025-54487
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A stack-based buffer overflow vulnerability exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted MFER file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability manifests on line 8842 of biosig.c on the current master branch (35a819fa), when the Tag is 12: else if (tag==12) //0x0C { // sampling resolution if (len>6) fprintf(stderr,"Warning MFER tag12 incorrect length %i>6
",len); val32 = 0; int8_t v8; curPos += ifread(&UnitCode,1,1,hdr); curPos += ifread(&v8,1,1,hdr); curPos += ifread(buf,1,len-2,hdr); In addition to values of `len` greater than 130 triggering a buffer overflow, a value of `len` smaller than 2 will also trigger a buffer overflow due to an integer underflow when computing `len-2` in this code path.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2025-07-23 CVE Reserved
- 2025-08-25 CVE Published
- 2025-08-25 CVE Updated
- 2025-08-26 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-121: Stack-based Buffer Overflow
CAPEC
References (1)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
The Biosig Project Search vendor "The Biosig Project" | Libbiosig Search vendor "The Biosig Project" for product "Libbiosig" | 3.9.0 Search vendor "The Biosig Project" for product "Libbiosig" and version "3.9.0" | en |
Affected
| ||||||
The Biosig Project Search vendor "The Biosig Project" | Libbiosig Search vendor "The Biosig Project" for product "Libbiosig" | <= Search vendor "The Biosig Project" for product "Libbiosig" and version " <= " | en |
Affected
|