Could someone point out how can one misuse the public writable directories?
In and of itself? They can't misuse them. In conjunction with other features (or vulnerabilities), it makes exploitation easier.
That's the entire answer. We could dive into hypothetical scenarios and discuss various threat models, but ultimately, recommendations to make your publicly accessible directories read-only come from a position of "don't take unnecessary risks".
It's a strong position to be in.