After gaining access, the attacker would then wait until iPhone next rebooted and begin implanting malware.
An attacker who got hands-on time with the victims iPhone could alternatively use the attack as a lockscreen bypass.
They also need to kill the access Control Center from the phones lockscreen.
source: www.techworm.net