This indicates an attack attempt against a Directory Traversal vulnerability in Airlive Ip Camera.
This is possible because the user input filters fail to properly sanitize the READ.filePath parameter that is passed to "/cgi-bin/admin/fileread". It allows a remote attacker to read arbitrary files on vulnerable systems via a crafted http request.
Information Disclosure: Remote attackers can gain sensitive information from vulnerable systems.
Currently we are unaware of any vendor supplied patch for this issue.