This indicates an attack attempt against a Directory Traversal vulnerability in Polycom Products.
The vulnerability is due to the user input filter failing to properly sanitize the name parameter value that is passed to "a_getlog.cgi". An attacker may browse arbitrary file by supplying an injection string through the URL.
Polycom Web Management Interface G3/HDX 8000 HD
Polycom Linux Development Platform 2.14.g3
Polycom HDX Video End Points 2.6
Polycom HDX 8000 0
Polycom Durango 2.6 build 4740
Polycom Durango 2.6
Information Disclosure: Remote attackers can gain sensitive information from vulnerable systems.
Refer to the vendor's web site for suggested workaround.