A flaw in the buy limit system for the MT token on the BSC chain let a hacker make off with around $
BlockSec Flags $242K Exploit on BSC: Attacker Manipulated MT-WBNB Pool via Flawed Buyer Rules
Another day, another DeFi exploit. BlockSec spotted a suspicious transaction on BSC targeting the MT-WBNB liquidity pool, with losses estimated at $242,000. The issue? A broken buyer restriction mechanism.
Here's how it went down. Under deflationary mode, normal buys would revert. But routers and the trading pair itself were whitelisted. That gave the attacker a way in: swap and remove liquidity via the router to grab MT from the pool.
Then came the manipulation. The attacker sold MT to build up pendingBurnAmount, called distributeFees() to burn MT directly from the pair—artificially pumping the price—and swapped back to WBNB for profit. A referral rule that let the first 0.2 MT transfer bypass restrictions was the entry point.

|
DISCLAIMER:
1. All content on this website (including but not limited to articles, data, charts, and analyses) is for general informational purposes only and does not constitute any form of investment advice, trading recommendation, or financial guidance. 2. Cryptocurrencies and digital assets are subject to extreme price volatility and high investment risk; you may lose part or all of your principal. Past performance does not predict future results. 3. The information on this website is based on sources we believe to be reliable, but we do not guarantee its accuracy, completeness, or timeliness. Any investment decisions made based on this website’s information are at your own risk. 4. We strongly recommend that you conduct your own thorough research and consult an independent, licensed financial advisor before making any investment decisions. |








