CVE-2021-47786
moderate-risk
Published 2026-01-16
Redragon Gaming Mouse driver contains a kernel-level vulnerability that allows attackers to trigger a denial of service by sending malformed IOCTL requests. Attackers can send a crafted 2000-byte buffer with specific byte patterns to the REDRAGON_MOUSE device to crash the kernel driver.
Do I need to act?
-
0.01% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (14)
M725-Lit Firmware
M617-Lit Firmware
M910-Ks Firmware
M801P-Rgb Firmware
M602-Ks Firmware
M914W-Rgb Firmware
M816-Pro Firmware
M602A-Rgb Firmware
M721 Firmware
M602Aw-Rgb Firmware
M915Rgb-Wl Firmware
M712-Rgb Firmware
M910-K Firmware
Bm-4091 Firmware
Affected Vendors
References (5)
Product
https://www.redragonzone.com/
Third Party Advisory
https://www.vulncheck.com/advisories/redragon-gaming-mouse-redragonmousesys-deni...
44
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
0/34 · Minimal
Exposure
18/34 · Moderate