I think it's more complicated than this. There actually are people who have used the vulnerability to access data (albeit non-sensitive data) to prove it works. It isn't detectable through logs. Just because there's no evidence of something hard to detect doesn't mean it hasn't happened and that we shouldn't be…