"In the third step of the Schnorr protocol, the prover's response takes the form $z=r+cx$.
Why can't this form $z=cr+x$ work?
I found these answers 2 are related to my questions
However, neither of these answers provides a specific attack method: how could a malicious prover generate a valid proof without knowing the $x$?
I understand that if we use $z=cr+x$ as the response and a malicious verifier uses $c=0$ as the challenge, then the zero-knowledge property does not hold.
I also know that, given the same commitment $R=g^r$, the knowledge extractor could extract the random number $r$ instead of the witness $x$. Therefore, it cannot be used to prove the property of soundness.
However, it remains unclear how a malicious prover could generate a valid proof without knowledge of $x$ when using the response form $z=cr+x$