This indicates an attack attempt against a remote command-execution vulnerability in 1024 CMS.
A vulnerability has been reported in 1024 CMS that may allow an attacker to execute shell commands on a vulnerable system. This is possible because the user input filters fail to properly sanitize the php_include parameter value that is passed to "standard.php". An attacker may include shell commands by supplying an injection string through the URL.
1024 CMS 1.4.4 and prior versions
System Compromise: Remote attackers can gain control of vulnerable systems.
Currently we are not aware of any patches supplied by the vendor for this issue.