Since the CVE was rejected, there is no exploit mechanism. The steps below are hypothetical and based on general vulnerability analysis principles:
Step 1: Initial Assessment: The security researcher identifies a potential vulnerability.
Step 2: Proof of Concept (PoC) Development: A PoC is created to demonstrate the vulnerability.
Step 3: Vendor Notification: The researcher or security team notifies the vendor.
Step 4: Patch Development: The vendor develops a patch to address the vulnerability.
Step 5: Internal Testing: The vendor tests the patch.
Step 6: Vulnerability Disclosure (or Lack Thereof): The vendor decides whether to publicly disclose the vulnerability. In this case, they chose not to.