Impact
An uncontrolled recursion bug exists in the AFP Spotlight protocol dissector of Wireshark that can trigger a crash when processing maliciously crafted packets. This causes a denial of service as the application terminates unexpectedly. The weakness maps to CWE-674 (Uncontrolled Recursion).
Affected Systems
Wireshark Foundation’s Wireshark application is affected. Versions 4.6.0 through 4.6.4 and 4.4.0 through 4.4.14 are vulnerable. The issue is present in the AFP Spotlight dissector of these releases.
Risk and Exploitability
CVSS score of 5.5 indicates moderate impact. The EPSS score is not available so we cannot quantify likelihood, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector involves an attacker supplying a crafted AFP Spotlight payload that Wireshark will parse locally, leading to a crash. No remote code execution or elevation is possible; the threat is limited to service disruption for the user.
OpenCVE Enrichment