Update APF VTS for VSR-14 compliance

Modified the VTS to check the APF version is 4 (or higher) as mandated
by VSR-14.

Bug: 380756020
Test: TH
Change-Id: I28f6579bf426e5338880fcc6afff33c769f29634
Merged-In: I28f6579bf426e5338880fcc6afff33c769f29634
(cherry picked from commit fe83a98b3e139a0caf7d7f5b64ec3144e26b9b41)
diff --git a/wifi/aidl/vts/functional/wifi_sta_iface_aidl_test.cpp b/wifi/aidl/vts/functional/wifi_sta_iface_aidl_test.cpp
index e456e49..2ee960f 100644
--- a/wifi/aidl/vts/functional/wifi_sta_iface_aidl_test.cpp
+++ b/wifi/aidl/vts/functional/wifi_sta_iface_aidl_test.cpp
@@ -175,9 +175,9 @@
         EXPECT_TRUE(isFeatureSupported(IWifiStaIface::FeatureSetMask::APF));
         StaApfPacketFilterCapabilities apf_caps = {};
         EXPECT_TRUE(wifi_sta_iface_->getApfPacketFilterCapabilities(&apf_caps).isOk());
-        // The APF version must be 4 and the usable memory must be at least
+        // The APF version must be 4 or higher and the usable memory must be at least
         // 1024 bytes.
-        EXPECT_EQ(apf_caps.version, 4);
+        EXPECT_GE(apf_caps.version, 4);
         EXPECT_GE(apf_caps.maxLength, 1024);
     }
 }