I found a Vulnerability. They found a Lawyer

Diving instructor spots “open door” logins; commenters yell “name them!” as company lawyers up

TLDR: A dive instructor found a “guess-the-number + default password” login flaw, disclosed it, and got legal threats instead of thanks; it’s now fixed but users may not have been warned. Commenters split between “name and shame,” report to regulators, and “never sign,” with jokes about a GDPR boss fight.

A scuba instructor-turned-security pro says he found a shockingly simple login flaw at a big dive insurer: accounts used numbered usernames and a single default password—no lockouts, no extra code step (what techies call MFA), and lots of people never changed it. He reported it with a 30‑day embargo, waited months, and says the company’s answer was… lawyers. The hole is now patched, but he hasn’t seen proof users—some of them kids—were warned. He refused to sign a broad silence pledge and asked for clarity.

The comments? A shipwreck of emotions. Veterans like xvxvx are exhausted, saying this is exactly how companies ignore security “with serious legal muscle” behind it. One camp is chanting “name and shame”, with refulgentis arguing Europe’s GDPR (privacy law) would trump corporate bluster—cue memes about a “GDPR boss battle.” Another camp, led by desireco42, wants a cleaner process: report straight to a national authority and let them handle it like a referee (and maybe pay a bounty). Then there’s vaylian’s hardline take: never sign anything when lawyers show up “to dominate.” The comic relief? A side quest accusing the post of sounding AI-made—circuit10 did a quick check and backed off. The internet’s verdict: from scuba bubbles to subpoena troubles, and apparently you could count to ten and log in.

Key Points

  • The member portal used incrementing numeric user IDs and a static default password for new accounts.
  • Users were not forced to change the default password on first login, and many accounts retained it.
  • The portal lacked rate limiting, account lockout, and MFA, enabling easy unauthorized access.
  • The vulnerability exposed full personal profiles, including those of underage students.
  • The issue was disclosed on April 28, 2025 with a 30-day embargo, later fixed; user notification remains unconfirmed.

Hottest takes

"Wish they named them." — refulgentis
"Why sign anything at all? The company was obviously not interested in cooperation, but in domination." — vaylian
"Each country should have a reporting authority" — desireco42
Made with <3 by @siedrix and @shesho from CDMX. Powered by Forge&Hive.