http://forumdzjegkm6ey6ngexwpv5u3f3sav5wnrwqmatcb6c6mhxmkhsczid.onion/topic/details/database-hacking-sqlite-essentials-and-attack-strategies/42
Attackers can abuse this functionality to load arbitrary shared libraries (.dll, .so files), enabling them to execute code at the same privilege level as the SQLite process. In a real-world case, this was exploited in an IoT device running SQLite. The device’s firmware had enabled load_extension for debugging purposes.