[rwth-security] After Code Execution, Researchers Show How CUPS Can Be Abused for