Once again, the granting of root access is the result of exploiting the hole, not giving consent to run the scripts to exploit the hole. The scripts run as the unprivileged user, and in using the exploit, gets the root access. So you're actually giving consent to running the scripts as an unprivileged user.
I get what you're saying, but instead of it being one huge step, it's two small steps that make up the one whole step.
BL.
This is correct.
And the OP does not really understand how the exploit works. It's evident in his responses here.