The problem with any device having any internet access at all is that it is quite trivial for a program to establish a connection to a known server (malware can initiate it) and then having those servers send commands back to the computer, effectively having control over it.
The problem with any device having any internet access at all is that it is quite trivial for a program to establish a connection to a known server (malware can initiate it) and then having those servers send commands back to the computer, effectively having control over it.