The impact of a successfully exploited race condition is dependent on the business logic of the vulnerable application. The consequences will vary depending on what check is performed and how the file is used. In general, attackers use such attacks to escalate privileges, execute arbitrary code, or perform a denial of service.