PANews reported on September 5th that, according to The Block, the decentralized exchange Bunni released a review report on Tuesday regarding a vulnerability attack that resulted in $8.4 million in losses. The report stated that the attack affected two trading pools: the weETH/ETH trading pair on Unichain and the USDC/USDT trading pair on the Ethereum mainnet. The vulnerability stemmed from an issue with the rounding direction used when updating idle balances in the smart contract, which occurred during user withdrawals. The attacker exploited this error to launch a flash loan attack, manipulating prices and liquidity in the trading pools. First, the attacker borrowed 3 million USDT through a flash loan and performed multiple token swaps to manipulate the price, reducing the available USDC to just 28 wei. The attacker then exploited rounding errors in 44 small withdrawals to further deplete the USDC balance, significantly reducing the total liquidity of the trading pool. Finally, the attacker executed a large token swap to inflate the price, then reversed the swap at the manipulated price. Bunni stated that all rounding operations tested secure individually, but combined they created a vulnerability. The rounding code has been updated and cross-chain withdrawals have been restored, but deposits, swaps, and other functions remain suspended. The platform is working with law enforcement to trace the funds transferred to Tornado Cash and is offering a 10% return bounty to the attacker. Future improvements to the testing framework will ensure a comprehensive and secure recovery.PANews reported on September 5th that, according to The Block, the decentralized exchange Bunni released a review report on Tuesday regarding a vulnerability attack that resulted in $8.4 million in losses. The report stated that the attack affected two trading pools: the weETH/ETH trading pair on Unichain and the USDC/USDT trading pair on the Ethereum mainnet. The vulnerability stemmed from an issue with the rounding direction used when updating idle balances in the smart contract, which occurred during user withdrawals. The attacker exploited this error to launch a flash loan attack, manipulating prices and liquidity in the trading pools. First, the attacker borrowed 3 million USDT through a flash loan and performed multiple token swaps to manipulate the price, reducing the available USDC to just 28 wei. The attacker then exploited rounding errors in 44 small withdrawals to further deplete the USDC balance, significantly reducing the total liquidity of the trading pool. Finally, the attacker executed a large token swap to inflate the price, then reversed the swap at the manipulated price. Bunni stated that all rounding operations tested secure individually, but combined they created a vulnerability. The rounding code has been updated and cross-chain withdrawals have been restored, but deposits, swaps, and other functions remain suspended. The platform is working with law enforcement to trace the funds transferred to Tornado Cash and is offering a 10% return bounty to the attacker. Future improvements to the testing framework will ensure a comprehensive and secure recovery.

Bunni points to smart contract rounding errors as the cause of an $8.4 million flash loan exploit

2025/09/05 11:50
2 min read

PANews reported on September 5th that, according to The Block, the decentralized exchange Bunni released a review report on Tuesday regarding a vulnerability attack that resulted in $8.4 million in losses. The report stated that the attack affected two trading pools: the weETH/ETH trading pair on Unichain and the USDC/USDT trading pair on the Ethereum mainnet. The vulnerability stemmed from an issue with the rounding direction used when updating idle balances in the smart contract, which occurred during user withdrawals. The attacker exploited this error to launch a flash loan attack, manipulating prices and liquidity in the trading pools.

First, the attacker borrowed 3 million USDT through a flash loan and performed multiple token swaps to manipulate the price, reducing the available USDC to just 28 wei. The attacker then exploited rounding errors in 44 small withdrawals to further deplete the USDC balance, significantly reducing the total liquidity of the trading pool. Finally, the attacker executed a large token swap to inflate the price, then reversed the swap at the manipulated price. Bunni stated that all rounding operations tested secure individually, but combined they created a vulnerability. The rounding code has been updated and cross-chain withdrawals have been restored, but deposits, swaps, and other functions remain suspended. The platform is working with law enforcement to trace the funds transferred to Tornado Cash and is offering a 10% return bounty to the attacker. Future improvements to the testing framework will ensure a comprehensive and secure recovery.

Market Opportunity
USDCoin Logo
USDCoin Price(USDC)
$0.9999
$0.9999$0.9999
-0.01%
USD
USDCoin (USDC) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Coinbase Joins Ethereum Foundation to Back Open Intents Framework

Coinbase Joins Ethereum Foundation to Back Open Intents Framework

Coinbase Payments has joined the Open Intents Framework as a core contributor, working alongside Ethereum Foundation and other major players. The initiative aims to simplify complex multi-chain interactions through automated solver technology. The post Coinbase Joins Ethereum Foundation to Back Open Intents Framework appeared first on Coinspeaker.
Share
Coinspeaker2025/09/18 02:43
UAE supermarket supplies remain stable, despite panic buying

UAE supermarket supplies remain stable, despite panic buying

UAE supermarkets report supplies remain ample and prices are unlikely to rise in the short term, despite fears that the widening regional conflict will cause residents
Share
Agbi2026/03/01 22:54
Why The Green Bay Packers Must Take The Cleveland Browns Seriously — As Hard As That Might Be

Why The Green Bay Packers Must Take The Cleveland Browns Seriously — As Hard As That Might Be

The post Why The Green Bay Packers Must Take The Cleveland Browns Seriously — As Hard As That Might Be appeared on BitcoinEthereumNews.com. Jordan Love and the Green Bay Packers are off to a 2-0 start. Getty Images The Green Bay Packers are, once again, one of the NFL’s better teams. The Cleveland Browns are, once again, one of the league’s doormats. It’s why unbeaten Green Bay (2-0) is a 8-point favorite at winless Cleveland (0-2) Sunday according to betmgm.com. The money line is also Green Bay -500. Most expect this to be a Packers’ rout, and it very well could be. But Green Bay knows taking anyone in this league for granted can prove costly. “I think if you look at their roster, the paper, who they have on that team, what they can do, they got a lot of talent and things can turn around quickly for them,” Packers safety Xavier McKinney said. “We just got to kind of keep that in mind and know we not just walking into something and they just going to lay down. That’s not what they going to do.” The Browns certainly haven’t laid down on defense. Far from. Cleveland is allowing an NFL-best 191.5 yards per game. The Browns gave up 141 yards to Cincinnati in Week 1, including just seven in the second half, but still lost, 17-16. Cleveland has given up an NFL-best 45.5 rushing yards per game and just 2.1 rushing yards per attempt. “The biggest thing is our defensive line is much, much improved over last year and I think we’ve got back to our personality,” defensive coordinator Jim Schwartz said recently. “When we play our best, our D-line leads us there as our engine.” The Browns rank third in the league in passing defense, allowing just 146.0 yards per game. Cleveland has also gone 30 straight games without allowing a 300-yard passer, the longest active streak in the NFL.…
Share
BitcoinEthereumNews2025/09/18 00:41