Theoretically, if you could get arbitrary code execution, you could potentially load the exploit, then load in the data through the disc drive, but it wouldn't be easy at all, as in, you would have to somehow get the exploit on the system itself, then actually get it to run.
It would be a lot...