Weirdly, a public exploit and technical details are available online, showing how attackers can trigger the vulnerability and remotely extract secrets, credentials, and other sensitive data.