CVE-2021-47789

Yenkee Hornet Gaming Mouse driver GM312Fltr.sys contains a buffer overrun vulnerability that allows attackers to crash the system by sending oversized input. Attackers can exploit the driver by sending a 2000-byte buffer through DeviceIoControl to trigger a kernel-level system crash.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:yenkee:yms_3029_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:yenkee:yms_3029:-:*:*:*:*:*:*:*

History

30 Jan 2026, 01:01

Type Values Removed Values Added
First Time Yenkee
Yenkee yms 3029
Yenkee yms 3029 Firmware
CPE cpe:2.3:o:yenkee:yms_3029_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:yenkee:yms_3029:-:*:*:*:*:*:*:*
CWE CWE-787
References () https://github.com/Quadron-Research-Lab/Kernel_Driver_bugs/tree/main/GM312Fltr - () https://github.com/Quadron-Research-Lab/Kernel_Driver_bugs/tree/main/GM312Fltr - Exploit
References () https://www.exploit-db.com/exploits/50311 - () https://www.exploit-db.com/exploits/50311 - Exploit
References () https://www.vulncheck.com/advisories/yenkee-hornet-gaming-mouse-gmfltrsys-denial-of-service-poc - () https://www.vulncheck.com/advisories/yenkee-hornet-gaming-mouse-gmfltrsys-denial-of-service-poc - Third Party Advisory
References () https://www.yenkee.eu/ - () https://www.yenkee.eu/ - Product

16 Jan 2026, 22:16

Type Values Removed Values Added
References () https://www.exploit-db.com/exploits/50311 - () https://www.exploit-db.com/exploits/50311 -

16 Jan 2026, 00:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-16 00:16

Updated : 2026-01-30 01:01


NVD link : CVE-2021-47789

Mitre link : CVE-2021-47789

CVE.ORG link : CVE-2021-47789


JSON object : View

Products Affected

yenkee

  • yms_3029_firmware
  • yms_3029
CWE
CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write