This indicates an attack attempt against a format string vulnerability in GNU Radius suite.
The vulnerability is caused by insufficient validation in the sqllog() function. By sending a specially crafted request message, a remote attacker could execute arbitrary code on a vulnerable system.
GNU Radius versions 1.2 and 1.3; other versions may also be affected.
System Compromise: Remote attackers can gain control of vulnerable systems.
Apply the most recent upgrades or patches from the vendor: