Unrated severityNVD Advisory· Published Jan 15, 2026· Updated Apr 7, 2026
Yenkee Hornet Gaming Mouse - 'GM312Fltr.sys' Denial of Service (PoC)
CVE-2021-47789
Description
Yenkee Hornet Gaming Mouse driver GM312Fltr.sys contains a buffer overrun vulnerability that allows attackers to crash the system by sending oversized input. Attackers can exploit the driver by sending a 2000-byte buffer through DeviceIoControl to trigger a kernel-level system crash.
Affected products
2- Yenkee/Yenkee Hornet Gaming Mousev5Range: all version
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/Quadron-Research-Lab/Kernel_Driver_bugs/tree/main/GM312Fltrmitretechnical-descriptionexploit
- www.exploit-db.com/exploits/50311mitreexploit
- www.vulncheck.com/advisories/yenkee-hornet-gaming-mouse-gmfltrsys-denial-of-service-pocmitrethird-party-advisory
- www.yenkee.eumitreproduct
News mentions
0No linked articles in our index yet.