Since the CVE was rejected, there is no known mechanism. Any hypothetical exploitation steps are speculative.
Step 1: Hypothetical Vulnerability Discovery: An unknown vulnerability is discovered in a software or hardware component.
Step 2: CVE Reservation: A CVE ID is requested and reserved to track the potential vulnerability.
Step 3: Investigation and Remediation (or Lack Thereof): The vendor investigates the issue. This could lead to a patch, a determination that the issue is not a vulnerability, or abandonment of the disclosure process.
Step 4: CVE Rejection: The CVE ID is marked as rejected because no public disclosure occurred.