Vulnerabilities in ETIC Telecom software