Because attacker-supplied flow data is used in public flows, the bug leads to unauthenticated remote code execution.
To everyone who starred, forked, and shared this skill — thank you. This project blew up in less than 24 hours, and the support from the community has been incredible. If this skill helps you work ...