Step 1: Local Access: The attacker must first have local access to the vulnerable system, either through a compromised account or physical access.
Step 2: Exploit Trigger: The attacker executes a crafted exploit against the scoterm utility. This exploit is designed to trigger the vulnerability.
Step 3: Payload Injection: The exploit injects malicious code, typically a shellcode, into the system's memory.
Step 4: Code Execution: The vulnerability allows the injected code to be executed with root privileges.
Step 5: Privilege Escalation: The injected shellcode typically spawns a root shell, granting the attacker full control over the system.