The vulnerability is an unauthenticated remote denial of service in the nltk.app.wordnet_app module. The root cause is a combination of two main issues. First, the wnb function, which starts the WordNet browser server, configured the underlying HTTPServer to listen on all network interfaces (0.0.0.0). This exposed the server to remote connections. Second, the MyServerHandler.do_GET method, which handles all GET requests, included a hidden feature to shut down the server. A request to the path /SHUTDOWN%20THE%20SERVER would trigger a call to os._exit(0), immediately terminating the server process. This shutdown mechanism had no authentication.
An attacker who could reach the server's port over the network could send a simple, unauthenticated GET request to shut it down, leading to a denial of service. The vulnerability is particularly easy to exploit. The fix for this vulnerability was to change the server's listening address in the wnb function from "" to "127.0.0.1", ensuring that the server is only accessible from the local machine, thus mitigating the remote threat.