What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker would only be able to delete targeted files on a system. They would not gain privileges to view or modify file contents.
Abdelhamid Naceri working with <a href="https://www.zerodayinitiative.com/">Trend Micro Zero Day Initiative</a>, <a href="https://twitter.com/lxf02942370">Xuefeng Li</a> and <a href="https://twitter.com/edwardzpeng">Zhiniang Peng</a> with <a href="https://www.sangfor.com/">Sangfor</a>