Vulnerabilities in Cisco Meraki Z3C