This indicates an attack attempt to exploit a Command Execution vulnerability in Iris ID IrisAccess ICU 7000-2.
The vulnerability is due to insufficient sanitizing of user supplied inputs in the application when handling a crafted HTTP request. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application, via a crafted HTTP request.
ICU Software: 1.00.08
ICU OS: 1.3.8
ICU File system: 1.3.8
EIF Firmware [Channel 1]: 1.9
EIF Firmware [Channel 2]: 1.9
Iris TwoPi: 1.4.5
System Compromise: Remote attackers can execute arbitrary code on vulnerable systems.
Currently we are unaware of any vendor supplied patch or updates available for this issue.