This has happened on almost every engagement I've used the scan on. I get an issue flagging "Client-side desync", which granted is marked "Tentative" but it seems like it should easily be detected as a false positive.
Both Response 1 and Response 2 are identical, despite the issue stating that the smuggled request in Request 1 is interpreted as the next request. It might be that the issue text is a little misleading or I'm not fully understanding the issue, but presumably if this were a Client-side desync, we would expect Response 2 to be the response from the smuggled request and not the actual Request 2?
If you need more info I can try to provide it, though so far I've only used this on real world targets so I would have to redact a lot of info.