Vulnerability Description
The BATBToken smart contract (address 0xfbf1388408670c02f0dbbb74251d8ded1d63b7a2, Compiler Version v0.8.26+commit.8a97fa7a) contains incorrect access control implementation in whitelist management functions. The setColdWhiteList() and setSpecialAddress() functions in the base ERC20 contract are declared as public without proper access control modifiers, allowing any user to bypass transfer restrictions and manipulate special address settings. This enables unauthorized users to circumvent cold time transfer restrictions and potentially disrupt dividend distribution mechanisms, leading to privilege escalation and violation of the contract's intended tokenomics.
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
- https://bscscan.com/address/0xfbf1388408670c02f0dbbb74251d8ded1d63b7a2#code
- https://github.com/RikkaLzw/CVE/blob/main/CVE_BATB-TOKEN.md
FAQ
What is CVE-2025-57247?
CVE-2025-57247 is a vulnerability with a CVSS score of 9.1 (CRITICAL). The BATBToken smart contract (address 0xfbf1388408670c02f0dbbb74251d8ded1d63b7a2, Compiler Version v0.8.26+commit.8a97fa7a) contains incorrect access control implementation in whitelist management fun...
How severe is CVE-2025-57247?
CVE-2025-57247 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-57247?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.