This indicates an attack attempt to exploit a remote Command Execution vulnerability in AirLink101 SkyIPCam1620W Wireless Network Camera.
The vulnerability is due to insufficient sanitizing of user supplied inputs in the application. An authenticate remote attacker may be able to exploit this to execute arbitrary OS commands within the context of the application, via a crafted HTTP request.
AirLink101 SkyIPCam1620W Wireless N MPEG4 3GPP Network Camera with firmware FW_AIC1620W_1.1.0-12_20120709_r1192.pck
System Compromise: Remote attackers can gain control of vulnerable systems.
Currently we are unaware of any vendor supplied patch or updates available for this issue.