Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9870: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Razer Synapse 3

0
High
VulnerabilityCVE-2025-9870cvecve-2025-9870cwe-59
Published: Wed Oct 29 2025 (10/29/2025, 19:34:08 UTC)
Source: CVE Database V5
Vendor/Project: Razer
Product: Synapse 3

Description

Razer Synapse 3 RazerPhilipsHueUninstall Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Razer Synapse 3. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Philips HUE module installer. By creating a symbolic link, an attacker can abuse the installer to delete arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-26375.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 06:24:56 UTC

Technical Analysis

CVE-2025-9870 is a local privilege escalation vulnerability found in Razer Synapse 3, specifically version 3.10.228.21112, affecting the Philips HUE module installer component. The vulnerability arises from improper link resolution before file access, classified under CWE-59 (Improper Link Resolution Before File Access). An attacker who already has the ability to execute low-privileged code on the target system can exploit this flaw by creating symbolic links that the installer follows incorrectly. This leads to arbitrary file deletion, which can be leveraged to escalate privileges to SYSTEM level. The vulnerability does not require user interaction but does require local access with some execution capability. The improper handling of symbolic links during the uninstall process of the Philips HUE module allows attackers to manipulate the file system in ways not intended by the software, enabling execution of arbitrary code with elevated privileges. The vulnerability was assigned CVE-2025-9870 and has a CVSS v3.0 base score of 7.8, reflecting high impact on confidentiality, integrity, and availability. No patches or public exploits have been reported yet, but the flaw was responsibly disclosed to the vendor and tracked as ZDI-CAN-26375 by the Zero Day Initiative.

Potential Impact

The primary impact of CVE-2025-9870 is that an attacker with limited local access and low privileges can escalate their privileges to SYSTEM level, gaining full control over the affected machine. This can lead to complete compromise of the system, including unauthorized access to sensitive data, installation of persistent malware, disabling security controls, and disruption of system availability. Since Razer Synapse 3 is widely used by gamers and professionals who use Razer hardware, compromised systems could be leveraged as entry points into corporate or personal networks. The vulnerability affects confidentiality, integrity, and availability, making it a critical risk in environments where Razer Synapse 3 is installed. Although exploitation requires local code execution, the ease of creating symbolic links and the lack of user interaction increase the risk in scenarios where attackers have limited footholds, such as through other lower-privileged malware or compromised user accounts.

Mitigation Recommendations

1. Immediate mitigation involves restricting local user permissions to prevent unauthorized code execution and symbolic link creation. 2. Monitor and audit file system changes, especially in directories related to Razer Synapse 3 and Philips HUE modules. 3. Disable or uninstall the Philips HUE module if it is not required, reducing the attack surface. 4. Employ application whitelisting and endpoint protection solutions that can detect and block suspicious symbolic link creation or file deletion activities. 5. Network segmentation and limiting local user privileges can reduce the risk of initial low-privileged code execution. 6. Stay alert for official patches or updates from Razer and apply them promptly once available. 7. Use host-based intrusion detection systems (HIDS) to detect attempts to exploit this vulnerability. 8. Educate users about the risks of running untrusted code locally, as initial low-privileged code execution is a prerequisite for exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
zdi
Date Reserved
2025-09-02T19:50:13.516Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 69027029ea3d051f2238734b

Added to database: 10/29/2025, 7:51:05 PM

Last enriched: 2/27/2026, 6:24:56 AM

Last updated: 3/26/2026, 10:06:05 AM

Views: 145

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses