Then upload the exploit zip file to the server. It will perform directory traversal attack to copy the evil.sh file in the root of the target service.