Vulnerabilities in AMI software