If memory serves, a WiFi access point can still leak original vendor even when SSID/BSSID are altered. It sends beacon packet that may contain vendor specific information and hardware capabilities of the device.
I think, if you concerned, a good alternative would be using Mudi travel router with Blue Merle firmware to regularly purge and replace IMEI, IMSI, BSSID, SSID. Not sure about beacon packets though, might still leak something. On the other hand, it's a travel router, i.e. a moving target, so not likely to be observed by someone for a long time.
On a different note, you could also consider adding "_nomap" suffix to your SSID if you prefer to remove it from google WiFi location data collection: https://support.google.com/maps/answer/1725632?hl=en#zippy=
Apple and Mozilla should respect this as well