This indicates an attempt to exploit a Single Flow vulnerability.
The vulnerability allows users to send customized Layer 7 application traffic. With this capability, we can use 'singleflow' in combination with the Security component to configure both the fragmentation size and the MTU limit.
There is no vulnerability associated with this signature.
System Compromise: Remote attackers can gain control of vulnerable systems.
Monitor the traffic from that network for any suspicious activity.