CVE-2021-47786
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-16

Last updated on: 2026-02-09

Assigner: VulnCheck

Description
Redragon Gaming Mouse driver contains a kernel-level vulnerability that allows attackers to trigger a denial of service by sending malformed IOCTL requests. Attackers can send a crafted 2000-byte buffer with specific byte patterns to the REDRAGON_MOUSE device to crash the kernel driver.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-16
Last Modified
2026-02-09
Generated
2026-05-07
AI Q&A
2026-01-16
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 14 associated CPEs
Vendor Product Version / Range
redragon m725-lit_firmware *
redragon m617-lit_firmware *
redragon m910-ks_firmware *
redragon m801p-rgb_firmware *
redragon m602-ks_firmware *
redragon m914w-rgb_firmware *
redragon m816-pro_firmware *
redragon m602a-rgb_firmware *
redragon m721_firmware *
redragon m602aw-rgb_firmware *
redragon m915rgb-wl_firmware *
redragon m712-rgb_firmware *
redragon m910-k_firmware *
redragon bm-4091_firmware *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-787 The product writes data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Redragon Gaming Mouse kernel driver (REDRAGON_MOUSE.sys). It allows an attacker with limited privileges and local access to cause a denial of service by sending malformed IOCTL requests. Specifically, an attacker can send a crafted 2000-byte buffer with specific byte patterns to the device, which causes the kernel driver to crash due to improper handling of the input. [2, 3]


How can this vulnerability impact me? :

The vulnerability can cause a denial of service (DoS) condition by crashing the kernel driver of the Redragon Gaming Mouse. This can lead to system instability or crashes, potentially disrupting normal operations on the affected machine. [2, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting to interact with the REDRAGON_MOUSE device driver using the specific IOCTL code 0x222414 and sending a crafted 2000-byte buffer (1000 bytes of '\x44' followed by 1000 null bytes) to the device. On a Windows system, you can use a script or program that opens a handle to the device '\\.\GLOBALROOT\Device\REDRAGON_MOUSE' with CreateFileA and sends the malformed buffer using DeviceIoControl. If the driver crashes or causes a denial of service, the vulnerability is present. The exploit proof-of-concept is implemented in Python using ctypes to perform these actions. [3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting local access to systems with the Redragon Gaming Mouse driver installed, as the vulnerability requires local privileges to exploit. Additionally, avoid using the vulnerable driver until a patched version is released by the vendor. Monitoring for unusual system crashes related to the REDRAGON_MOUSE driver can help detect exploitation attempts. If possible, uninstall or disable the Redragon Gaming Mouse driver to prevent exploitation. [2, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart