The vulnerability exists in the deserialize_binary_form function located in packages/kit/src/runtime/form-utils.js. The function is responsible for deserializing binary form data from a request. The security advisory mentions that malformed form data can lead to memory exhaustion. The provided commit patch f47c01bd8100328c24fdb8522fe35913b0735f35 confirms this. Before the patch, the code directly parsed a section of the request representing file offsets using JSON.parse and assumed it would be a flat array of numbers. However, no validation was performed on the parsed structure. The patch introduces strict validation to ensure the parsed data is an array of non-negative integers. The added test case demonstrates an attack where a nested array in the file offsets table, when processed, would lead to type coercion and a very large string allocation, causing the process to crash. Therefore, the deserialize_binary_form function is the vulnerable function as it's the entry point for processing the malicious data.