This indicates detection of malicious PHP file uploading by Bot Network.
Attacker upload malicious PHP files to a infected web system. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application.
Any infected HTTP server is vulnerable
System Compromise: Remote attackers can gain control of vulnerable systems.
Remove the infected file and Monitor the traffic from that network for any suspicious activity.