The vulnerability stems from inadequate input validation and error handling within the Red Lion HMI's HTTP server. Specifically, the server fails to properly handle extremely long URI strings in POST requests. When a request with a URI exceeding the allocated buffer size is received, it leads to a buffer overflow or other memory corruption issues. This, in turn, causes a software exception, crashing the HMI's HTTP server and leading to a DoS condition. The root cause is a lack of bounds checking on the URI length before processing the request, allowing an attacker to overwrite critical memory regions. The software exception is likely triggered by an attempt to access or write to an invalid memory address after the buffer overflow.