Ex vulnerability researcher here, basically you need to understand the system you’re exploiting and find a flaw in the logic to use to your advantage. If you want a more in-depth analysis let me know and I can explain how I’d find and create exploits.
Latest Answers