The BATBToken smart contract (address 0xfbf1388408670c02f0dbbb74251d8ded1d63b7a2, Compiler Version v0.8.26+commit.8a97fa7a) contains incorrect access control implementation in whitelist management functions. The setColdWhiteList() and setSpecialAddress() functions in the base ERC20 contract are declared as public without proper access control modifiers, allowing any user to bypass transfer restrictions and manipulate special address settings. This enables unauthorized users to circumvent cold time transfer restrictions and potentially disrupt dividend distribution mechanisms, leading to privilege escalation and violation of the contract's intended tokenomics.
Metrics
Affected Vendors & Products
References
History
Mon, 06 Oct 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-284 | |
Metrics |
cvssV3_1
|
Mon, 06 Oct 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The BATBToken smart contract (address 0xfbf1388408670c02f0dbbb74251d8ded1d63b7a2, Compiler Version v0.8.26+commit.8a97fa7a) contains incorrect access control implementation in whitelist management functions. The setColdWhiteList() and setSpecialAddress() functions in the base ERC20 contract are declared as public without proper access control modifiers, allowing any user to bypass transfer restrictions and manipulate special address settings. This enables unauthorized users to circumvent cold time transfer restrictions and potentially disrupt dividend distribution mechanisms, leading to privilege escalation and violation of the contract's intended tokenomics. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-10-06T17:23:19.683Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-57247

Updated: 2025-10-06T17:22:33.885Z

Status : Received
Published: 2025-10-06T17:16:05.697
Modified: 2025-10-06T18:15:51.520
Link: CVE-2025-57247

No data.

No data.