To prevent this type of bug from being used to, Intel added a protection to NOT allow code from outside of the SMRAM from being executed. This is done in order to prevent a class of vulnerabilities known as
System Management Mode (SMM) call out. However, this protection can be bypassed by using a ROP chain, as detailed by
Synactiv. The authors of the post claim that ROP chains are simple to create because of how the builds work on UEFI.