with only one user interaction(download a malicious config), attackers can gain full command execution on the victim system.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-6940.json"