{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T07:38:49.070","vulnerabilities":[{"cve":{"id":"CVE-2025-54486","sourceIdentifier":"talos-cna@cisco.com","published":"2025-08-25T14:15:34.667","lastModified":"2025-11-03T19:16:10.503","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A stack-based buffer overflow vulnerability exists in the MFER parsing functionality of The Biosig Project libbiosig 3.9.0 and Master Branch (35a819fa). A specially crafted MFER file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability manifests on line 8824 of biosig.c on the current master branch (35a819fa), when the Tag is 11:\r\n\r\n                else if (tag==11)    //0x0B\r\n                {\r\n                    // Fs\r\n                    if (len>6) fprintf(stderr,\"Warning MFER tag11 incorrect length %i>6\\n\",len);\r\n                    double  fval;\r\n                    curPos += ifread(buf,1,len,hdr);"},{"lang":"es","value":"Existe una vulnerabilidad de desbordamiento de búfer en la pila en la funcionalidad de análisis MFER de The Biosig Project libbiosig 3.9.0 y Master Branch (35a819fa). Un archivo MFER especialmente manipulado puede provocar la ejecución de código arbitrario. Un atacante puede proporcionar un archivo malicioso para activar esta vulnerabilidad. Esta vulnerabilidad se manifiesta en la línea 8824 de biosig.c en la rama maestra actual (35a819fa), cuando la etiqueta es 11: else if (tag==11) //0x0B { // Fs if (len&gt;6) fprintf(stderr,\"Warning MFER tag11 incorrect length %i&gt;6\\n\",len); double fval; curPos += ifread(buf,1,len,hdr);"}],"metrics":{"cvssMetricV31":[{"source":"talos-cna@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"talos-cna@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-121"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:libbiosig_project:libbiosig:*:*:*:*:*:*:*:*","versionEndExcluding":"3.9.1","matchCriteriaId":"4893D615-FD95-4393-A5B0-E1BE19F180A6"}]}]}],"references":[{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2025-2234","source":"talos-cna@cisco.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2234","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}