With everything wrapped up in an old server case with some 3D printed parts to hold it all together, he was able to get a 4-node Kubernetes cluster up and running for an absolute bargain price.
"To exploit this vulnerability, the attacker needs to apply malicious YAML files on the cluster. A user ... their privileges to admin status on those nodes, Kubernetes explained on GitHub.