The vulnerability arises from the Windows Task Scheduler, wherein the hacker can run a specific .job file.