If you are picking up the keys from the raw binary than that indicates use on other devices as well. I mainly asked the question to make sure those are not private keys being generated on a device setup etc. which basically would mean everyone has a different private key.
It's hard to say on what all you can do with it, but you'll have to figure out what those are used for.
If say,
SSH based access is granted on those keys, then you can generate keys and login on all such devices.
this is used for Code Signing, you can put executable code signed by the vendor.
etc.