Since the CVE was rejected, there is no exploit mechanism. The steps are hypothetical and non-existent:
Step 1: Initial Discovery: A potential vulnerability was identified.
Step 2: Analysis: The potential vulnerability was analyzed.
Step 3: Rejection: The vulnerability was deemed not exploitable or not warranting disclosure, leading to CVE rejection.