How can you show that a bug is exploitable without actually writing an exploit? Exploit equivalence classes. https://blog.isosceles.com/exploit-equivalence-classes/
This post shares a model based on the set theory concept of "equivalence classes" that can help security researchers and vulnerability triage teams assess and communicate the exploitability of bugs in a consistent way.
