This indicates an attack attempt to launch a remote command shell.
Attackers may inject shell code or run a malicious script that can bring up a command prompt as a remote console. This provides attackers with complete access to the victim system without any authentication.
Any unprotected Windows or Linux system is vulnerable to the attack.
System Compromise: Remote attackers can gain control of vulnerable systems.
Monitor the traffic from that network for any suspicious activity.
Use AntiVirus software to scan and clean the system.