To save time, I will use Metasploit to exploit it by simply providing the required information such as URI, RHOST, RPORT, etc. At this point, the exploitation will be successful. It is also possible to exploit it manually by uploading VBS payloads to the target machine and executing them using cscript.exe.