The vulnerability exists in two functions, tx_ups and tx_rups, within the copyparty/httpcli.py file. Both functions are responsible for handling and listing uploads and allow filtering based on a user-provided parameter named 'filter'. The core of the vulnerability lies in the fact that this 'filter' string is directly used to compile a regular expression without any sanitization or validation. An attacker can craft a malicious regular expression pattern that leads to catastrophic backtracking, a condition where the regex engine takes an extremely long time to process a string, effectively causing a Denial of Service (DoS). The provided patch remediates this by removing the regex compilation and search (re.compile and filt.search) and replacing it with a safe, custom string anchoring logic (str_anchor) that only allows simple startswith and endswith checks, thus eliminating the possibility of a ReDoS attack.