Armed with the information, adversaries can explore and attack the local WiFi network, or identify and physically track any Android device.
Source: Threadpost