Take the recent log4j vulnerabilities. Serving static content and logging trivial fields like request headers would lead to RCE. If that box can route to my home router, and my router has a defect available through routersploit, my network is completely pwned.
A network isolated VM with a tunnel to a remote vps would stop that particular attack.
All that being said…if a sophisticated adversary is targeting me I have to concede there are much easier routes to take.
I’m a security engineer at my day job so I may have conditioned myself into excessive fear.