Razer Chroma SDK Rest Server through 3.12.17 allows remote attackers to execute arbitrary programs because there is a race condition in which a file created under "%PROGRAMDATA%\Razer Chroma\SDK\Apps" can be replaced before it is executed by the server. The attacker must have access to port 54236 for a registration step.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://assets.razerzone.com/dev_portal/REST/html/index.html | vendor advisory |
https://www.youtube.com/watch?v=fkESBVhIdIA | third party advisory |
https://www.angelystor.com/2020/09/cve-2020-16602-remote-file-execution-on.html | third party advisory |
http://packetstormsecurity.com/files/160225/Razer-Chroma-SDK-Server-3.16.02-Race-Condition.html | exploit vdb entry third party advisory |