Vulnerabilities in Cisco Meraki Z3