CVE-2025-54481

A stack-based buffer overflow vulnerability exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted MFER file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability manifests on line 8744 of biosig.c on the current master branch (35a819fa), when the Tag is 3: else if (tag==3) { // character code char v[17]; // [1] if (len>16) fprintf(stderr,"Warning MFER tag2 incorrect length %i>16\n",len); curPos += ifread(&v,1,len,hdr); v[len] = 0; In this case, the overflowed buffer is the newly-declared `v` \[1\] instead of `buf`. Since `v` is only 17 bytes large, much smaller values of `len` (even those encoded using a single octet) can trigger an overflow in this code path.
Configurations

Configuration 1 (hide)

cpe:2.3:a:libbiosig_project:libbiosig:*:*:*:*:*:*:*:*

History

03 Nov 2025, 19:16

Type Values Removed Values Added
References
  • () https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2234 -

Information

Published : 2025-08-25 14:15

Updated : 2025-11-03 19:16


NVD link : CVE-2025-54481

Mitre link : CVE-2025-54481

CVE.ORG link : CVE-2025-54481


JSON object : View

Products Affected

libbiosig_project

  • libbiosig
CWE
CWE-121

Stack-based Buffer Overflow