Disclosure
(NEW): Admin Account Takeover via Password Reset Chain + OTP Brute Force
Finding 22 (NEW): Admin Account Takeover via Password Reset Chain + OTP Brute Force Severity: CRITICAL (CVSS 9.8 - AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) The admin password reset endpoint (`/api/v1/admin/auths/reset-password`) is fully accessible with only a device token (no user a
- Target
- Nigerian Payment Provider
- Category
- Rate Limit Bypass
- Channel
- Responsible Disclosure
- Disclosed
- 2026-04
Redaction note
Vendor identity withheld.
This finding is documented here as part of MemCyber’s public disclosure record. The vendor has been anonymized to a sector and region descriptor. Full technical detail — including root cause, reproducible proof-of-concept, remediation guidance, and vendor attribution where granted — is available to qualified prospects under NDA.
Coordinated disclosure
How we handled it.
- Reported to the vendor via Responsible Disclosure with a reproducible proof-of-concept.
- Triage + remediation window coordinated with the vendor security team.
- Fix verified before any public reference.
- This record published only after the embargo period closed.