While the vulnerability could be exploited by unauthenticated threat actors over the Internet, cybersecurity experts have not detected attempts at active exploitation or the existence of a malware variant associated with this attack. In their report, cybersecurity experts mention that successful exploitation of this flaw could lead to the total compromise of the vulnerable system.