This indicates an attack attempt to exploit a Code Execution vulnerability in Supervisor process control software.
The vulnerability is due to an input validation error while parsing a crafted HTTP request. A remote attacker could exploit this to execute arbitrary code within the context of the target application, via a crafted HTTP request.
Valid login authentication is required to exploit this vulnerability.
Supervisor version 3.0 and prior
Supervisor version 3.1.3 and prior
Supervisor version 3.2.3 and prior
Supervisor version 3.3.2 and prior
System Compromise: Remote attackers can gain control of vulnerable systems.
Apply the most recent upgrade or patch from the vendor.