The vulnerability lies in the WebSocket event handlers within the init function in server/runtime/index.js. The patch eb2d8a20964ce7acaa0f442a181390a5f726a1ae introduces a new function, isSocketWriteAuthorized, to check if a socket has the authority to perform write operations. This check is then applied to the event handlers for Events.IoEventTypes.DEVICE_VALUES and Events.IoEventTypes.DEVICE_ENABLE. Before the patch, these handlers would directly call devices.setDeviceValue and devices.enableDevice respectively, without any authorization check. This allowed any unauthenticated user connected via WebSockets to modify device tags and enable or disable devices, leading to the authorization bypass vulnerability. Since these event handlers are anonymous functions defined within the init function, the init function is identified as the vulnerable function that would appear in a runtime profile during exploitation.