This indicates an attack attempt to exploit one or more vulnerabilities in HiSilicon DVR devices.
The vulnerability is due to insufficient validation of user supplied inputs when processing HTTP requests. It may allow remote attackers to execute arbitrary system commands and disclose sensitive information within the context of the application.
HiSilicon DVR devices
Information Disclosure: Remote attackers can gain sensitive information from vulnerable systems.
System Compromise: Remote attackers can gain control of vulnerable systems.
Monitor the traffic from that network for any suspicious activity.