Vulnerabilities in Echo Sign