
ExVul
872 posts

ExVul
@exvulsec
State-of-the-art Web3 security services (audits, pentest etc). We are trusted by OKX, Bitget, Stacks, Aptos, Sui, etc. Book an audit: https://t.co/mOtBwIAwnt









🚨 BSC DeFi Exploit Alert — $LML Single-Pool Price Manipulation Chain: BSC Loss: ~$950.37K USDT Target: 0xb7b7631b97d93344b2a29e926e42578006794b3b (LML Power) Vulnerable Contract: 0xae406f357541f45f01bec21f9f28c43757f202e4 (Reward Proxy) Attack Tx: bscscan.com/tx/0x805d273a6… Summary: An attacker exploited LML's reward settlement system on BSC, netting ~$950.37K USDT. The attacker aggregated massive flash liquidity from Moolah, Venus, Aave V3, and multiple PancakeSwap/Uniswap V3 pools, then used 309,529,000 USDT to buy nearly all LML from the LML/USDT PancakeSwap pool — skewing the reserve ratio by ~67,347x and sending purchased tokens to a burn address. With the pool in this extreme state, the attacker triggered the LML Power reward settlement path 11 times using helper addresses. The reward system's `updatePrice()` directly consumed the manipulated LP reserves as its price input, with no TWAP, oracle, or same-block cooldown. Each round called `updatePrice → updateUser → sendMining → swapBack → claimReward`, converting inflated reward accounting into real tokens at the manipulated price. After 11 rounds, the attacker dumped remaining LML back into the pool, repaid all borrowed funds within the same transaction, and transferred 950,370.69 USDT profit to 0x3c00b00007f11c84a6cf0bea4dff8de79be8fb51. #DeFiSecurity #BSC #ExploitAlert








