The vulnerability is a Denial of Service in the SiYuan kernel's WebSocket server. The root cause is a combination of an authentication bypass and unsafe handling of user-controlled input. The analysis of kernel/server/serve.go reveals that the serveWebSocket function sets up the vulnerable environment. Within this function, an anonymous handler for WebSocket connections (server.serveWebSocket.func3) allows unauthenticated access if a specific query string is present in the connection URL. Once connected, another anonymous handler for messages (server.serveWebSocket.func7) processes incoming JSON data. This handler uses unchecked type assertions on the received data. An attacker can exploit this by first connecting to the WebSocket endpoint without authentication and then sending a malformed JSON payload. The unsafe type assertions in the message handler will fail, triggering a runtime panic that crashes the entire kernel process, resulting in a Denial of Service.