PeckShield briefly describes the attack process:
1.The attacker borrowed 6,047.13 WBNB flash loans from the PancakeSwap WBNB-BUSDT pool;
2.In BurgerSwap, call the function DemaxPlatform.swapExactTokensForTokens() to convert 6,029 WBNB to 92,677 BURGER;
3.Create counterfeit BURGER-Fake LP on BurgerSwap platform, and issue 100 counterfeit coins and 45,316.6 BURGER;
4.Exchange 100 counterfeit coins into 45,316.6 WBNB;
5.In this step, the attacker attacked the contract through a reentry attack and made another exchange, which was 45,453 BURGER to 4,478.6 WBNB;