Since you worded that as a challenge... by maliciously modifying the CAD files that will be fed to the 3D printer.
...or by building an otherwise identical object that manipulates flaws in how the Wi-fi reads the signals and then replacing the original object with the malicious one.