An issue in Sane 1.2.1 allows a local attacker to execute arbitrary code via a crafted file to the sanei_configure_attach() function. NOTE: this is disputed because there is no expectation that the product should be starting with an attacker-controlled configuration file.
https://gitlab.com/sane-project/backends/-/issues/708
http://seclists.org/fulldisclosure/2024/Jan/64
http://packetstormsecurity.com/files/176818/sane-1.2.1-Null-Pointer.html