CUPS vulnerabilities can lead to remote code execution and facilitate DDoS attacks.
Exploiting CUPS for DDoS requires minimal resources, making it appealing for attackers.
A crafted packet sent to a CUPS server can initiate a DDoS attack.
Exploiting these vulnerabilities could cost less than one cent on modern platforms.