LFI to RCE Vulnerability

It explains on the page about Injecting code into log files.