Also:
> Exploitation of this vulnerability requires an attacker to first gain authenticated access to your Redis instance.