henry9018 My question was not about whether there is an unfixed vulnerability present, but whether using either the baseband or the USB-C port is maybe more secure.
I don't think it's possible to provide a strong answer here. The problem is that there isn't really anything about cellular baseband hardware or Ethernet hardware or USB-C hardware that is particularly safe or particularly dangerous. The risks are generally going to be in firmware or software. In both cases there's a lot of it (which adds risk) and it's complicated (which adds risk). The cellular baseband hardware certainly has a bunch of closed-source firmware (and then there will be driver code, plus of course an entire IP stack to exploit), but these days an Ethernet transceiver probably also contains firmware (and then there will be driver code, plus of course an entire IP stack to exploit). There is probably less firmware inside an Ethernet dongle, but it's probably much harder to replace that firmware.
I guess you could try adding up the lines of code or the sizes of the object code for each option, but honestly either way there will be a lot of it. These days USB-C includes the DisplayPort Alt Mode code, which I suspect is not small.
Some people seem to have a certainty that cellular baseband firmware is uniquely dangerous, but it's not clear what supports that. It's true that when a radio is involved it's possible to mount an attack from the other side of a wall or the other side of the street... but actually people compromise IP routers, especially home routers, from the other side of the world every day.
Meanwhile, if the question is whether a random malefactor is more likely to get into a Pixel via the cellular baseband or by sneaking through an Ethernet cable... I suspect the answer is: neither one. It's more likely they'll show up via a web page delivered over one or the other.
And if the question is whether somebody deliberately targeting a specific person will show up over the air or along a wire.... any well-resourced attacker will try to figure out which vulnerabilities that specific person is subject to (including inventing new ones).