This is a whole lot of nothing. If you want to exploit this flaw, you either need access to the phone or get the user to install your trojan horse app. If you do that, then you can borrow their network resources, IF you're in range. There are far easier ways of getting on somebody's network, and for the same effort you can do far more harm in other ways. This is a whole lot of nothing.
And I was just thinking it had been a couple weeks since the last "MASSIVE SECURITY HOLE FOUND IN [blank]" news report. They come out every 2-3 weeks or so, and usually require such a difficult exploit that no one would actually use them.