The vulnerability is an open redirect in Byaidu PDFMathTranslate v1.9.9. The vulnerability exists in the /gradio_api endpoint, which is part of the Gradio framework used by the application. The pdf2zh/gui.py file contains the code for the Gradio user interface. The setup_gui function in this file is responsible for launching the Gradio server with demo.launch(). This makes the application vulnerable to the open redirect issue present in the version of Gradio used by PDFMathTranslate v1.9.9. The vulnerability can be triggered by sending a request to the /gradio_api/file= endpoint with an external URL in the file parameter, which will cause a 302 redirect to that URL. Therefore, the setup_gui function is identified as the key function that exposes the vulnerability.