The archive contains a file with a relative path like C:\Users\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\exploit.exe .
RARLAB removed unacev2.dll entirely to fix the issue.
This vulnerability allowed attackers to execute code remotely by simply having a user extract a specially crafted archive. 🛡️ The Vulnerability: CVE-2018-20250