At the time of writing, it is unclear what attack method was used by Gonjeshke Darande to conduct the exploit.