This indicates an attack attempt to gain Unauthorized Access to MongoDB.
The vulnerability is due to the software's insecure default configuration. As a result, a remote attacker can send a crafted query to connect, and execute arbitrary commands to a database.
System Compromise: Remote attackers can add, view, delete or modify data in an affected database.
Refer to the vendor's web site for suggested workaround.