Yenkee Hornet Gaming Mouse driver GM312Fltr.sys contains a buffer overrun vulnerability that allows attackers to crash the system by sending oversized input. Attackers can exploit the driver by sending a 2000-byte buffer through DeviceIoControl to trigger a kernel-level system crash.
References
| Link | Resource |
|---|---|
| https://github.com/Quadron-Research-Lab/Kernel_Driver_bugs/tree/main/GM312Fltr | Exploit |
| https://www.exploit-db.com/exploits/50311 | Exploit |
| https://www.vulncheck.com/advisories/yenkee-hornet-gaming-mouse-gmfltrsys-denial-of-service-poc | Third Party Advisory |
| https://www.yenkee.eu/ | Product |
| https://www.exploit-db.com/exploits/50311 | Exploit |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-01-16 00:16
Updated : 2026-01-30 01:01
NVD link : CVE-2021-47789
Mitre link : CVE-2021-47789
CVE.ORG link : CVE-2021-47789
JSON object : View
Products Affected
yenkee
- yms_3029_firmware
- yms_3029
