Can you please explain smth to me?
There is this vulnerability:
It explicitly says that it allows for remote code execution. However when I search in exploit-db for that CVE I get an exploit which does DoS on my lab and crashes the system, and it's also categorized as DOS in metasploit. So how is this arbitrary code? All over the net when looking at notes of this vulnerability, it specifically says the attacker who exploits it can create users, get information etc.
Am I missing something?
I am trying to get shell..ultimately