Since the CVE was rejected, there is no exploitable mechanism. The steps below describe the typical lifecycle of a CVE, which is not applicable here:
Step 1: Vulnerability Discovery: A security researcher or developer identifies a potential security flaw.
Step 2: Reporting: The vulnerability is reported to the vendor or a CNA.
Step 3: CVE Assignment: A CVE ID is assigned to the vulnerability.
Step 4: Vulnerability Analysis: The vulnerability is analyzed to determine its impact and severity.
Step 5: Patch Development: The vendor develops a patch to fix the vulnerability.
Step 6: Public Disclosure: The vulnerability and patch are publicly disclosed.
Step 7: Exploitation (if applicable): Attackers attempt to exploit the vulnerability.