Vulnerabilities in MI Configurator