The vulnerability is a heap-based buffer overflow (CWE-122) leading to RCE, with the attack vector involving network-supplied data (e.g., model files). LightGBM's model loading mechanism is a prime candidate, as it processes external input. The LoadModelFromString/LoadModelFromFile functions in the C++ core (e.g., src/booster.cpp) are critical points for deserialization. The lack of explicit patch details necessitates inference based on: (1) the CWE type pointing to memory safety issues in data parsing, (2) the RCE severity implying exploitation via model loading, and (3) the version range suggesting fixes in the model handling logic of v4.6.0. Confidence is medium due to the absence of explicit commit/diff data.