Can you elaborate on the desired outcome vs the perceived issue please? Like what is the specific goal. A router that tunnels all WAN traffic encrypted, to exit elsewhere like TOR. IS it just for web browsing (HTTP proxy) or other application (SoCKS proxy), etc?
IF that is the case, I do this at home to bypass my cell provider's bandwidth steering. I use a cellular modem ATT thinks is a phone for home internet. They can be very finicky about what sites they allow full barrel and what they like to nanny. I have a very basic linux router that does a proxy to an SSH server on another network I control elsewhere and not ATT. Then I use that for the whole LAN by setting up SOCAT As a service, and relaying that through the SSH proxy listening on 127.0.0.1.
My LAN clients set the firewall as their proxy, and the internet thinks all the clients are on the other network when they reach the world.
So in your case you would need someone in a non restricted area, and a port/protocol that would pass whatever they are filtering. From there all your traffic would go through that tunnel, and NOT be subject to inspection.
IS this what you are going for, if so I could provide instruction on how to do that....
SSH tunneling
https://www.baeldung.com/linux/ssh-tunneling-and-proxying
SOCAT socket forwarding (relay to and from proxy at 127.0.0.1 to LAN accessible interface IP)
https://www.redhat.com/sysadmin/getting-started-socat
Very basic linux router to wrap it into.
https://gridscale.io/en/community/tutorials/debian-router-gateway/
If you do the minimal install “Expert install” your router/firewall will be very small.
Can do the same for the remote endpoint, really it is just an SSH server that allows dynamic forwarding, again, bare minimum linux install required, and very meager resources.’
Easy to preconfigure and ship to someone out of the country to run in something like KVM or virtualbox.
Use Pubkey at least for SSH authentication if you plan on putting on the internet.
Suggested pubkey + password to be safer, and if you are comfortable use MFA like google authenticator as well.
https://kb.iu.edu/d/aews
https://goteleport.com/blog/ssh-2fa-tutorial/
Then all you have to do is trust whomever is running the remote side.