The vulnerability is a classic LDAP injection issue within the moonraker.components.ldap.Ldap class. The analysis of the patch commit 74c5d8e44c4a4abbfbb06fb991e7ebb9ac947f42 clearly shows the vulnerability and its fix. The _perform_ldap_auth method was responsible for building the LDAP search filter. Before the patch, it directly embedded the user-provided username into the filter string, as seen in the removed lines: ldfilt = f"(&(objectClass=Person)({attr_name}={username}))" and ldfilt = self.user_filter.replace("USERNAME", username). This allows an attacker to inject arbitrary filter syntax. The fix involves using the escape_filter_chars function to sanitize the username before it is used, preventing the injection. The function authenticate_ldap_user is the asynchronous entry point that calls the vulnerable _perform_ldap_auth function, and both would likely be present in a runtime profile during an exploit attempt.