A denial of service flaw exists in Battle Carry versions .005 and below. A packet bigger than 8192 bytes causes a socket error in the Python code used to handle the server which immediately terminates the socket and interrupts the listening on the UDP port where has been received the packet.
dd19b491411de098999e9bd19c17cd529e108a99d9ab332c8aca828a21660070
Proof of concept exploit for a denial of service flaw in Battle Carry versions .005 and below.
1e666d38c52624ec93a7527705397b601e2503b8728c4a034998faa99fa7a1f7