Those are the RESULT of the hack that the recent update addresses, and which my blog post discusses: indeed it's the second aspect of the hack, where I said that files could be created that included a CFML shell that could do all kinds of untoward things, now web-accessible.
They are showing their observation of the file HAVING BEEN created, and how the cfexecute led to it. But I am willing to bet that those who found such files placed there were not yet updated---and if they DID update then they would no longer be able to have those readily executed via the "specifically crafted URL" I mentioned in my post.
I didn't (in my post) elaborate on those details, because that's kind of the tail wagging the dog. The vuln that ALLOWED it to happen was the first priority, the Adobe update was the second. The block I offered (for those not on CF2021 or 2018) was the third. And then the fourth was (as I said) that if the bad guys DID get the file on the server, that file could do all sort of nasty things.
Of course, they WOULD want to deal with such files. I didn't elaborate on where one may find it, but
I did discuss it a bit, saying for example that the cfusion/wwwroot was a common place they'd put them. But they could put them anywhere (that CF could write to), so I didn't want to give a false sense of security to look there.
I did recommend people do a compare of their code to any good working version (git, local copy), and I recommended they could look for files updated since the day they may find the other "evidences" I shared.
But yeah, it's all nasty. Get that update in place, folks. Or the blocks of the _cfclient query string var I discuss in the post.