The research paper demonstrates a potential attack scenario that makes use of this combination of weaknesses and allows a remote actor to dupe the target into creating a dangerous substance without any physical interaction needed from the attacker’s side.