The vulnerability described is a denial of service in aiohttp due to uncontrolled memory allocation when processing large payloads. The provided patch clearly indicates that the post method in aiohttp/web_request.py was modified to address this issue. The change involves how the size of incoming multipart data is calculated. Previously, the size was reset for each part of the multipart form, allowing an attacker to bypass the intended client_max_size limit by splitting a large payload into many smaller parts. The fix ensures the total size of all parts is checked against the limit. Therefore, the Request.post function is the vulnerable function, as it's responsible for processing the malicious input that triggers the memory exhaustion.