FKIE_CVE-2021-47786
Vulnerability from fkie_nvd - Published: 2026-01-16 00:16 - Updated: 2026-02-09 14:27
Severity ?
Summary
Redragon Gaming Mouse driver contains a kernel-level vulnerability that allows attackers to trigger a denial of service by sending malformed IOCTL requests. Attackers can send a crafted 2000-byte buffer with specific byte patterns to the REDRAGON_MOUSE device to crash the kernel driver.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redragon:m725-lit_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08F36681-26DF-449E-96F5-17C115A1FE5A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:redragon:m725-lit:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C0E44E8-C428-4186-9153-FFAE92659A38",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redragon:m617-lit_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E78B3006-E3A9-40F1-9454-656645BF892E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:redragon:m617-lit:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B192E6EC-0445-4FE2-86C1-B9290C8A21C5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redragon:m910-ks_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "687EF1E6-D5C7-4EA9-90CD-8D1D706C2C9F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:redragon:m910-ks:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2F5BD2B-97D9-47D7-8E6D-25C53BC76F74",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redragon:m801p-rgb_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE1C3073-8D70-45F2-8F29-6AC57B5E74E1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:redragon:m801p-rgb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3F847228-0F0B-495C-9A9F-3FA846FB0B8F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redragon:m602-ks_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "736BAD05-9D7B-4E5A-A38D-7F0DA42148D5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:redragon:m602-ks:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C93E506C-AAE1-4C74-948B-E8075F4E4799",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redragon:m914w-rgb_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "425DEDE4-AAD3-42D1-8E1E-9565E1B07E1E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:redragon:m914w-rgb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DB2B418-E165-477D-8D99-8B1082051C4F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redragon:m816-pro_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "67DAD031-205D-4F7C-9304-D72A90877E84",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:redragon:m816-pro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6A746508-45A7-4900-91EF-764877CE254F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redragon:m602a-rgb_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5A792A0-C353-4C21-A773-5E8B4C865CF0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:redragon:m602a-rgb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08CBF911-61D2-474C-8408-2848482F1D90",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redragon:m721_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E9D3D78-C5CC-4CB6-8509-4F5F631A24FB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:redragon:m721:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87F21B8B-734B-4F3F-A633-3302C9945F4F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redragon:m602aw-rgb_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ACEE7D99-1DAD-4B0F-8CEF-3A9E9DE6AA7F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:redragon:m602aw-rgb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83D68CBE-62C7-44FA-AC1E-625AD8E28031",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redragon:m915rgb-wl_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9AB795EA-4915-46E5-9C4F-E7DEC7252ECF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:redragon:m915rgb-wl:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9384850C-F6C7-4DD4-BC40-7334EF2C0406",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redragon:m712-rgb_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "78DC8986-56AF-406A-9BCF-21E903DBA68D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:redragon:m712-rgb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9DFD4181-CFA2-46B5-A739-AE1C5DB2FB64",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redragon:m910-k_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C94F87A2-29D7-465B-97BC-C9533FF510B5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:redragon:m910-k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E67446C-985B-41E0-8C13-8A017345C253",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redragon:bm-4091_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69835B94-8446-45A8-A3F7-3C5A19AE3ABE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:redragon:bm-4091:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE711085-17D1-4C45-A015-115454A58301",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Redragon Gaming Mouse driver contains a kernel-level vulnerability that allows attackers to trigger a denial of service by sending malformed IOCTL requests. Attackers can send a crafted 2000-byte buffer with specific byte patterns to the REDRAGON_MOUSE device to crash the kernel driver."
}
],
"id": "CVE-2021-47786",
"lastModified": "2026-02-09T14:27:35.203",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "disclosure@vulncheck.com",
"type": "Secondary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "disclosure@vulncheck.com",
"type": "Secondary"
}
]
},
"published": "2026-01-16T00:16:21.887",
"references": [
{
"source": "disclosure@vulncheck.com",
"tags": [
"Exploit"
],
"url": "https://github.com/Quadron-Research-Lab/Kernel_Driver_bugs/tree/main/REDRAGON_MOUSE"
},
{
"source": "disclosure@vulncheck.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.exploit-db.com/exploits/50322"
},
{
"source": "disclosure@vulncheck.com",
"tags": [
"Product"
],
"url": "https://www.redragonzone.com/"
},
{
"source": "disclosure@vulncheck.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.vulncheck.com/advisories/redragon-gaming-mouse-redragonmousesys-denial-of-service-poc"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.exploit-db.com/exploits/50322"
}
],
"sourceIdentifier": "disclosure@vulncheck.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "disclosure@vulncheck.com",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…