Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 30 Jan 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Yenkee yms 3029
Yenkee yms 3029 Firmware |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:h:yenkee:yms_3029:-:*:*:*:*:*:*:* cpe:2.3:o:yenkee:yms_3029_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Yenkee yms 3029
Yenkee yms 3029 Firmware |
Fri, 16 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 16 Jan 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Yenkee
Yenkee hornet Gaming Mouse |
|
| Vendors & Products |
Yenkee
Yenkee hornet Gaming Mouse |
Thu, 15 Jan 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Yenkee Hornet Gaming Mouse driver GM312Fltr.sys contains a buffer overrun vulnerability that allows attackers to crash the system by sending oversized input. Attackers can exploit the driver by sending a 2000-byte buffer through DeviceIoControl to trigger a kernel-level system crash. | |
| Title | Yenkee Hornet Gaming Mouse - 'GM312Fltr.sys' Denial of Service (PoC) | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-07T14:06:11.481Z
Reserved: 2026-01-14T14:39:44.738Z
Link: CVE-2021-47789
Updated: 2026-01-16T15:53:22.069Z
Status : Analyzed
Published: 2026-01-16T00:16:22.450
Modified: 2026-01-30T01:01:23.560
Link: CVE-2021-47789
No data.
OpenCVE Enrichment
Updated: 2026-01-16T13:42:15Z