Okay, but how? Is someone reading commands in a "how the exploit works" write-up and... running them?

Never underestimate human stupidity, especially when it comes to IT.