Routing path. So long as the Techno can connect to the comlink he planted (he can) he should be able to access whatever device the comlink is attached to and begin infiltrating that network.
Generally though, once you move to the wired framework, instead of considering the thousands of devices wired into that network, you just move back to the "host" shorthand of previous editions. Every camera is part of a wired network called the "sensor host" which is connected to other similar wired "host" node clusters. Then you only consider the highest level threats in that specific host. So, you hide from the nastiest IC and the quickest Spider attached to that network. If you beat them down and shut them out, there may be others that follow.