Uncovering Vulnerabilities of LLM-Assisted Cyber Threat Intelligence