Reversing the Root: Identifying the Exploited Vulnerability in 0-days Used In-The-Wild