If anybody looks at that exploit and says 'hey that curl command doesn't work', I know, you have to fix it.
The +CSCOE+/sdesktop/webstart.xml attack surface is a bit nuts. It takes any parameters you specify and echos them back. Also, that whole area is exposed even if you disable webvpn (which is supposed to be end of life feature) - the code is still just sat there.