{"id":"CVE-2025-54487","details":"A stack-based buffer overflow vulnerability exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted MFER file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability manifests on line 8842 of biosig.c on the current master branch (35a819fa), when the Tag is 12:\r\n\r\n                else if (tag==12)    //0x0C\r\n                {\r\n                    // sampling resolution\r\n                    if (len\u003e6) fprintf(stderr,\"Warning MFER tag12 incorrect length %i\u003e6\\n\",len);\r\n                    val32   = 0;\r\n                    int8_t  v8;\r\n                    curPos += ifread(&UnitCode,1,1,hdr);\r\n                    curPos += ifread(&v8,1,1,hdr);\r\n                    curPos += ifread(buf,1,len-2,hdr);\r\n\r\nIn addition to values of `len` greater than 130 triggering a buffer overflow, a value of `len` smaller than 2 will also trigger a buffer overflow due to an integer underflow when computing `len-2` in this code path.","modified":"2026-04-10T05:29:35.687756Z","published":"2025-08-25T14:15:34.860Z","references":[{"type":"WEB","url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2234"},{"type":"EVIDENCE","url":"https://talosintelligence.com/vulnerability_reports/TALOS-2025-2234"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"3.9.1"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-54487.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}