The fact that it requires specific hardware to do it is an indication that it is an exploit.
From a Blue about exploits