I'm following the discussion in the question about RSA and what if we set $p<q$
Nothing bad will happen - the CRT algorithm we use doesn't actually depend on $p > q$ - it'll work both ways.
The standard algorithm to perform the final CRT step is:
$$m = m_q + q \cdot ((m_p - m_q) \cdot qinv \bmod p)$$
(where $m_p = c^{d_p} \bmod p$ and $m_q = c^{d_q} \bmod q$)
It is easy to see that $0 \le m < pq$ (if $0 \le m_p < p$ and $0 \le m_q < q$) and that $m = m_q \bmod q$ and (given $q \cdot qinv = 1 \bmod p$ ) that $m = m_p \bmod p$.
Because $p, q$ are relatively prime, there is only one such $m$ which meets all three criteria, and hence $m$ must be the proper decryption.
Note that none of the steps used the relative magnitude of $p$ and $q$ - they would all be true for either ordering.
So, the adversary complains that the decryption is failing.
Why would decryption fail?
Can the adversary gain any advantage from learning $c_{wrong}$ and $c_{correct}$?
Those are both valid ciphertexts; RSA (with correct padding) is CCA secure, and so there is no advantage.
The obvious follow-up question would be:
Why then did they specify that p > q in the first place?
Dunno - the question you linked to gives some plausible reasons why it might make an implementation easier.