mgetty version 1.2.0 suffers from buffer overflow, code execution, and various other privilege escalation related vulnerabilities.
5cde5e7365b154e8262b6205e6637682d79c5af218b7b7eaba96caf20fd7870a
Debian Linux Security Advisory 4291-1 - Two input sanitization failures have been found in the faxrunq and faxq binaries in mgetty, a smart modem getty replacement. An attacker could leverage them to insert commands via shell metacharacters in jobs id and have them executed with the privilege of the faxrunq/faxq user.
01184320968b42e5427a27c3e858855de74eee165669f308234d30a3e41f1552