How to not get this problem:

Don't exploit a system just because its exploitable