Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2270 articles · 131215 vulns · 38/41 feeds (7d)
← Back to list
5.5
CVE-2026-6537EXPLOITEDPATCHED
wireshark · wireshark

Stack-based Buffer Overflow in Wireshark

Description

ZigBee protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service

Affected Products

VendorProductVersions
wiresharkwireshark4.6.0, 4.4.0

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
open sourcewiresharkcert_advisory90%

References

  • https://www.wireshark.org/security/wnpa-sec-2026-24.html
  • https://gitlab.com/wireshark/wireshark/-/issues/21125(issue-tracking, permissions-required)

Related News (2 articles)

Tier C
VulDB4d ago
CVE-2026-6537 | Wireshark up to 4.4.14/4.6.4 ZigBee Protocol Dissector stack-based overflow (ID 21125)
→ No new info (linked only)
Tier B
BSI Advisories4d ago
[NEU] [hoch] Wireshark: Mehrere Schwachstellen
→ No new info (linked only)
CVSS 3.15.5 MEDIUM
VectorCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
null
CWECWE-121
PublishedApr 30, 2026
Last enriched4d agov2
Trending Score33
Source articles2
Independent2
Info Completeness9/14
Missing: epss, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-5656EXP
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Wireshark
Trending: 62
HIGHCVE-2026-5405EXP
Heap-based Buffer Overflow in Wireshark
Trending: 62
HIGHCVE-2026-5403EXP
Heap-based Buffer Overflow in Wireshark
Trending: 62
HIGHCVE-2026-5402
Heap-based Buffer Overflow in Wireshark
Trending: 47
HIGHCVE-2026-5299EXP
Uncontrolled Recursion in Wireshark
Trending: 35

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 30, 2026
Discovered by ZDM
Apr 30, 2026
Updated: severity, activelyExploited, patchAvailable
Apr 30, 2026
Actively Exploited
Apr 30, 2026
Patch Available
Apr 30, 2026

Version History

v2
Last enriched 4d ago
v2Tier C4d ago

Updated severity to CRITICAL, marked as actively exploited, and noted that no exploit is available.

severityactivelyExploitedpatchAvailable
via VulDB
v14d ago

Initial creation