I've seen this intro before and here is what I think is happening.
Aiden connects to the network locally, and his hacker friend routes through him. It goes like this
Hacker -> Internet -> Aiden -> Network -> Victim(s)
Yes this is possible, all you'd need to a payload on the phone and port forwarding configured on the router. Once you execute the payload on the phone to stationary attacker could establish a route on the phone and pivot into the network.
In short, yes it's possible, but not very straight forward.#BringBackOTW-Defalt