Can a locally delivered update path such as USB or a web-upload mechanism satisfy the CRA instead of OTA?
Potentially, yes.
The CRA requires that vulnerabilities can be addressed through security updates and that manufacturers provide mechanisms to securely distribute updates. It does not say that every compliant update path has to be wireless, cloud-delivered, or continuously remote.
The ETSI materials in the local CRA corpus make that practical point explicit. ETSI EN 303 645 says update mechanisms can range from direct download from a remote server to delivery via a mobile application or transfer over a USB or other physical interface. ETSI TR 103 621 gives concrete examples of signed updates delivered from a manufacturer-prepared USB stick and of constrained devices accepting firmware uploaded through a user interface after signature verification. So OTA is one compliant implementation pattern, not the only one. This is an inference from the CRA's functional wording together with the ETSI examples.
Annex I Part I point (2)(c), Annex I Part II point (7)
provisions 5.3-2 and 5.3-3
sections 6.10 Example 2, 6.11 Example 3, and 6.15 Example 3