The vulnerability GHSA-94v7-wxj6-r2q5 in reactive-firewall/multicast was due to a dependency on a vulnerable version of setuptools (CWE-1395). The exploit scenario involves a compromised build process if multicast (before v2.0.9a0) is built from source using a malicious setuptools version.
The identified 'vulnerable functions' are components of the setup.py script that was part of multicast's build system prior to the fix. These functions (readFile, parse_requirements_for_install_requires) and the main execution block of setup.py were not intrinsically flawed but were the parts of multicast's build infrastructure that would execute and interact with the setuptools library. During a compromised build, these script components would be on the execution path leading to or involving the vulnerable setuptools dependency, and thus would appear in a runtime profile of that malicious build process.
The fix, implemented in commit c5c7c7de272421d944beca8452871bca6bfd151f, involved removing setup.py entirely, adopting a pyproject.toml-based build system (PEP 621), and explicitly requiring a patched version of setuptools (>=80.4). This change in build methodology and dependency versioning directly addresses the vulnerability by ensuring a secure version of setuptools is used and by moving away from the legacy setup.py execution model.