It depends on what you mean by "compromising" the network. If you want to have as an invariant that "nothing untrusted is connected to the network", such that the network can be trusted, then yes, connecting anything compromised to the network breaks that invariant. Note that you probably already have a lot of untrusted stuff connected to the network, like smart TVs, a router provided by an untrustworthy ISP, possibly security cameras, voice assistants, cheap Android phones, any such devices belonging to guests in your house to whom you give the wifi password, etc.
If on the other hand you treat the network layer as untrusted, which is what all good security professionals will tell you to do, there is no such thing as "compromising the network". It wasn't something you had to trust to begin with.