Redragon Gaming Mouse driver contains a kernel-level vulnerability that allows attackers to trigger a denial of service by sending malformed IOCTL requests. Attackers can send a crafted 2000-byte buffer with specific byte patterns to the REDRAGON_MOUSE device to crash the kernel driver.
Metrics
Affected Vendors & Products
References
History
Mon, 09 Feb 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redragon bm-4091
Redragon bm-4091 Firmware Redragon m602-ks Redragon m602-ks Firmware Redragon m602a-rgb Redragon m602a-rgb Firmware Redragon m602aw-rgb Redragon m602aw-rgb Firmware Redragon m617-lit Redragon m617-lit Firmware Redragon m712-rgb Redragon m712-rgb Firmware Redragon m721 Redragon m721 Firmware Redragon m725-lit Redragon m725-lit Firmware Redragon m801p-rgb Redragon m801p-rgb Firmware Redragon m816-pro Redragon m816-pro Firmware Redragon m910-k Redragon m910-k Firmware Redragon m910-ks Redragon m910-ks Firmware Redragon m914w-rgb Redragon m914w-rgb Firmware Redragon m915rgb-wl Redragon m915rgb-wl Firmware |
|
| CPEs | cpe:2.3:h:redragon:bm-4091:-:*:*:*:*:*:*:* cpe:2.3:h:redragon:m602-ks:-:*:*:*:*:*:*:* cpe:2.3:h:redragon:m602a-rgb:-:*:*:*:*:*:*:* cpe:2.3:h:redragon:m602aw-rgb:-:*:*:*:*:*:*:* cpe:2.3:h:redragon:m617-lit:-:*:*:*:*:*:*:* cpe:2.3:h:redragon:m712-rgb:-:*:*:*:*:*:*:* cpe:2.3:h:redragon:m721:-:*:*:*:*:*:*:* cpe:2.3:h:redragon:m725-lit:-:*:*:*:*:*:*:* cpe:2.3:h:redragon:m801p-rgb:-:*:*:*:*:*:*:* cpe:2.3:h:redragon:m816-pro:-:*:*:*:*:*:*:* cpe:2.3:h:redragon:m910-k:-:*:*:*:*:*:*:* cpe:2.3:h:redragon:m910-ks:-:*:*:*:*:*:*:* cpe:2.3:h:redragon:m914w-rgb:-:*:*:*:*:*:*:* cpe:2.3:h:redragon:m915rgb-wl:-:*:*:*:*:*:*:* cpe:2.3:o:redragon:bm-4091_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:redragon:m602-ks_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:redragon:m602a-rgb_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:redragon:m602aw-rgb_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:redragon:m617-lit_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:redragon:m712-rgb_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:redragon:m721_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:redragon:m725-lit_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:redragon:m801p-rgb_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:redragon:m816-pro_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:redragon:m910-k_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:redragon:m910-ks_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:redragon:m914w-rgb_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:redragon:m915rgb-wl_firmware:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Redragon bm-4091
Redragon bm-4091 Firmware Redragon m602-ks Redragon m602-ks Firmware Redragon m602a-rgb Redragon m602a-rgb Firmware Redragon m602aw-rgb Redragon m602aw-rgb Firmware Redragon m617-lit Redragon m617-lit Firmware Redragon m712-rgb Redragon m712-rgb Firmware Redragon m721 Redragon m721 Firmware Redragon m725-lit Redragon m725-lit Firmware Redragon m801p-rgb Redragon m801p-rgb Firmware Redragon m816-pro Redragon m816-pro Firmware Redragon m910-k Redragon m910-k Firmware Redragon m910-ks Redragon m910-ks Firmware Redragon m914w-rgb Redragon m914w-rgb Firmware Redragon m915rgb-wl Redragon m915rgb-wl Firmware |
Fri, 16 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 16 Jan 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redragon
Redragon gaming Mouse |
|
| Vendors & Products |
Redragon
Redragon gaming Mouse |
Thu, 15 Jan 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Redragon Gaming Mouse driver contains a kernel-level vulnerability that allows attackers to trigger a denial of service by sending malformed IOCTL requests. Attackers can send a crafted 2000-byte buffer with specific byte patterns to the REDRAGON_MOUSE device to crash the kernel driver. | |
| Title | Redragon Gaming Mouse - 'REDRAGON_MOUSE.sys' Denial of Service (PoC) | |
| Weaknesses | CWE-787 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-01-15T23:25:39.342Z
Updated: 2026-01-16T21:12:36.886Z
Reserved: 2026-01-14T14:39:44.738Z
Link: CVE-2021-47786
Updated: 2026-01-16T15:55:18.830Z
Status : Analyzed
Published: 2026-01-16T00:16:21.887
Modified: 2026-02-09T14:27:35.203
Link: CVE-2021-47786
No data.
ReportizFlow