CVE-2021-47786
BaseFortify
Publication date: 2026-01-16
Last updated on: 2026-02-09
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| redragon | m725-lit_firmware | * |
| redragon | m617-lit_firmware | * |
| redragon | m910-ks_firmware | * |
| redragon | m801p-rgb_firmware | * |
| redragon | m602-ks_firmware | * |
| redragon | m914w-rgb_firmware | * |
| redragon | m816-pro_firmware | * |
| redragon | m602a-rgb_firmware | * |
| redragon | m721_firmware | * |
| redragon | m602aw-rgb_firmware | * |
| redragon | m915rgb-wl_firmware | * |
| redragon | m712-rgb_firmware | * |
| redragon | m910-k_firmware | * |
| redragon | bm-4091_firmware | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Redragon Gaming Mouse kernel driver (REDRAGON_MOUSE.sys). It allows an attacker with limited privileges and local access to cause a denial of service by sending malformed IOCTL requests. Specifically, an attacker can send a crafted 2000-byte buffer with specific byte patterns to the device, which causes the kernel driver to crash due to improper handling of the input. [2, 3]
How can this vulnerability impact me? :
The vulnerability can cause a denial of service (DoS) condition by crashing the kernel driver of the Redragon Gaming Mouse. This can lead to system instability or crashes, potentially disrupting normal operations on the affected machine. [2, 3]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by attempting to interact with the REDRAGON_MOUSE device driver using the specific IOCTL code 0x222414 and sending a crafted 2000-byte buffer (1000 bytes of '\x44' followed by 1000 null bytes) to the device. On a Windows system, you can use a script or program that opens a handle to the device '\\.\GLOBALROOT\Device\REDRAGON_MOUSE' with CreateFileA and sends the malformed buffer using DeviceIoControl. If the driver crashes or causes a denial of service, the vulnerability is present. The exploit proof-of-concept is implemented in Python using ctypes to perform these actions. [3]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting local access to systems with the Redragon Gaming Mouse driver installed, as the vulnerability requires local privileges to exploit. Additionally, avoid using the vulnerable driver until a patched version is released by the vendor. Monitoring for unusual system crashes related to the REDRAGON_MOUSE driver can help detect exploitation attempts. If possible, uninstall or disable the Redragon Gaming Mouse driver to prevent exploitation. [2, 3]