with only one user interaction(download a malicious config), attackers can gain full command execution on the victim system.