The vulnerability lies in the deserialization of continuation tokens for long-running operations. The from_continuation_token methods in both _JobsStrategy and _AsyncJobsPollingMethod classes were using Python's pickle module to deserialize user-controlled data. The pickle module is not secure against erroneous or maliciously constructed data. A malicious actor could craft a special serialized object that, upon deserialization with pickle.loads, would execute arbitrary code on the system. The patch replaces the insecure pickle.loads with the safer json.loads, which mitigates the remote code execution risk by only allowing the deserialization of simple JSON data structures.