The vulnerability exists in the http_range method of the BaseRequest class in aiohttp/web_request.py. The method is responsible for parsing the HTTP Range header. The original implementation used a regular expression that did not enforce ASCII-only digits, allowing for the use of unicode decimal characters in the range specification. This could lead to a discrepancy in how aiohttp and a backend server interpret the Range header, creating a potential for HTTP request smuggling. The provided patch addresses this by adding the re.ASCII flag to the re.findall function call within http_range, thereby restricting the accepted characters to ASCII digits and mitigating the vulnerability.