That's not really true if the exploit requires soldering on to RAM pins and executing on a second, independent machine.