The most important part of the this is to exploit it would require a location with an IR camera with scripting capabilities to be exploited, modification of the working recognition script.
the scary part is both these scripts and IR cameras are extemly common, being that the IR is used for night vision, which is pretty common these days with the market of IOT devices, with remote exploitation of the camera it can be used as a staging post, for further exploitation. an advanced example of this would be
Exploiting the remote camera, and inserting the modified shell code containing a motion configuration such as a certain type of wave or even characteristics of a CEO walking steps trough gait analysis.
when the script on the camera recognizes the pre-configured motion or movement, it would execute a further script such either a further exploit to attack that specific person when on site or more malicious activity such as ransomware.