{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T16:50:51.303","vulnerabilities":[{"cve":{"id":"CVE-2025-54484","sourceIdentifier":"talos-cna@cisco.com","published":"2025-08-25T14:15:34.280","lastModified":"2025-11-03T19:16:10.277","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A stack-based buffer overflow vulnerability exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted MFER file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability manifests on line 8779 of biosig.c on the current master branch (35a819fa), when the Tag is 6:\r\n\r\n\t\t\t\telse if (tag==6) \t// 0x06 \"number of sequences\"\r\n\t\t\t\t{\r\n\t\t\t\t\t// NRec\r\n\t\t\t\t\tif (len>4) fprintf(stderr,\"Warning MFER tag6 incorrect length %i>4\\n\",len);\r\n\t\t\t\t\tcurPos += ifread(buf,1,len,hdr);"},{"lang":"es","value":"Existe una vulnerabilidad de desbordamiento de búfer en la pila en la funcionalidad de análisis MFER de The Biosig Project libbiosig 3.9.0 y Master Branch (35a819fa). Un archivo MFER especialmente manipulado puede provocar la ejecución de código arbitrario. Un atacante puede proporcionar un archivo malicioso para activar esta vulnerabilidad. Esta vulnerabilidad se manifiesta en la línea 8779 de biosig.c en la rama maestra actual (35a819fa), cuando la etiqueta es 6: else if (tag==6) // 0x06 \"number of sequences\" { // NRec if (len&gt;4) fprintf(stderr,\"Warning MFER tag6 incorrect length %i&gt;4\\n\",len); curPos += ifread(buf,1,len,hdr);"}],"metrics":{"cvssMetricV31":[{"source":"talos-cna@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"talos-cna@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-121"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:libbiosig_project:libbiosig:*:*:*:*:*:*:*:*","versionEndExcluding":"3.9.1","matchCriteriaId":"4893D615-FD95-4393-A5B0-E1BE19F180A6"}]}]}],"references":[{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2025-2234","source":"talos-cna@cisco.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2234","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}