Known Vulnerabilities in AP Configurator