Vulnerabilities in L-INX Configurator