Description
A heap-based buffer overflow vulnerability exists in the Nicolet WFT parsing functionality of The Biosig Project libbiosig 3.9.2 and Master Branch (db9a9a63). A specially crafted .wft file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
Published: 2026-03-03
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary code execution via heap-based buffer overflow
Action: Patch Now
AI Analysis

Impact

A heap‑based buffer overflow exists in the Nicolet WFT parsing functionality of The Biosig Project libbiosig 3.9.2 and the corresponding Master branch. A specially crafted .wft file can overwrite heap memory and lead to arbitrary code execution. The code processes untrusted input without proper bounds checking, which is reflected by the CWE‑122 designation. If exploited, an attacker could execute code with the privileges of the running process and compromise the integrity of the host system.

Affected Systems

The vulnerability is present in libbiosig version 3.9.2 and the Master branch as identified by the library name, The Biosig Project libbiosig. Any system or application that incorporates this version and processes .wft files—commonly used in medical and scientific data acquisition contexts—is at risk. The maintainers of The Biosig Project are the vendor responsible for addressing the flaw.

Risk and Exploitability

The CVSS base score of 8.1 places this flaw in the high severity range. The EPSS score of less than 1 % indicates that exploitation is currently unlikely, but the potential impact warrants immediate attention. The vulnerability is not listed in the CISA KEV catalog. Likely exploitation requires an attacker to supply a malicious .wft file to the affected process, either locally or through a compromised component that parses user‑supplied data. The flaw does not require privilege escalation to be triggered, allowing both local and remote attackers who can influence file input to the application to exploit it.

Generated by OpenCVE AI on April 18, 2026 at 10:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update libbiosig to the latest patch or a version that fixes the heap overflow flaw
  • Recompile any dependent applications against the updated library so the fix is applied
  • If possible, disable or remove the Nicolet WFT parsing capability for data from untrusted sources as a temporary measure

Generated by OpenCVE AI on April 18, 2026 at 10:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 18 Apr 2026 10:30:00 +0000

Type Values Removed Values Added
Title Heap Overflow in Biosig libbiosig 3.9.2 Enables Code Execution

Thu, 05 Mar 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Libbiosig Project
Libbiosig Project libbiosig
CPEs cpe:2.3:a:libbiosig_project:libbiosig:3.9.2:*:*:*:*:*:*:*
Vendors & Products Libbiosig Project
Libbiosig Project libbiosig

Wed, 04 Mar 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared The Biosig Project
The Biosig Project libbiosig
Vendors & Products The Biosig Project
The Biosig Project libbiosig

Tue, 03 Mar 2026 16:30:00 +0000


Tue, 03 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 03 Mar 2026 14:45:00 +0000

Type Values Removed Values Added
Description A heap-based buffer overflow vulnerability exists in the Nicolet WFT parsing functionality of The Biosig Project libbiosig 3.9.2 and Master Branch (db9a9a63). A specially crafted .wft file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.
Weaknesses CWE-122
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Libbiosig Project Libbiosig
The Biosig Project Libbiosig
cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2026-03-03T15:17:02.898Z

Reserved: 2026-01-28T12:55:18.367Z

Link: CVE-2026-20777

cve-icon Vulnrichment

Updated: 2026-03-03T15:17:02.898Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-03T15:16:18.187

Modified: 2026-03-05T18:16:07.880

Link: CVE-2026-20777

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T10:15:25Z

Weaknesses