### [CVE-2021-30494](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30494) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Multiple system services installed alongside the Razer Synapse 3 software suite perform privileged operations on entries within the Razer Chroma SDK subkey. These privileged operations consist of file name concatenation of a runtime log file that is used to store runtime log information. In other words, an attacker can create a file in an unintended directory (with some limitations). ### POC #### Reference - https://versprite.com/blog/security-research/razer-synapse-3-security-vulnerability-analysis-report/ - https://versprite.com/security-resources/ #### Github No PoCs found on GitHub currently.