The inner zip files are just stored, uncompressed:
Archive: update.zip
Index Encryption Compression CRC32 Uncompressed Packed size Name
----- ---------- ----------- -------- ------------ ------------ ----------------
0 ZipCrypto Store d1bca061 65761967 65761979 system_lib.zip
1 ZipCrypto Deflate 64a3f383 2183 741 config.json
2 ZipCrypto Store 3731280f 89300292 89300304 app.zip
3 ZipCrypto Store a2bd64f5 135518964 135518976 app_lib.zip
4 ZipCrypto Store 700eb186 5996410 5996422 system.zip
So 12 bytes from the original content.
The attack worked, the password is
cmF0dGEK
.This was obtained by generating 32 possible plaintexts for the first 10 bytes of system.zip (based on the different values in the headers of ~300 zip files on my system), plus three null bytes for the high bytes of compressed size, file name length and extra field length.