Well - sharing my experience - I can't run an OpenVPN client on my corp laptop, but I can run L2TP/IPsec or PPTP...
So when dealing with hospitality networks, generally I'll get one of the two options up - worst case, if they block both, I'll use SSH to build a tunnel to an end-point that I know/trust/control... in many cases, even with VPN, I'll still set up SSH to build tunnels as needed...
Open WiFi is like being on an Ethernet hub - fire up Wireshark, and start collecting data - it's all in the clear... it's like writing postcards as opposed to putting mail in envelopes...
Do a filter on tindr, grindr, and craigslist in the early evening at a hotel site on public/open wifi - might be surprised how much traffic there is there - all in the clear...
Really - with VPN, one needs to know both end-points - as a road warrior/remote working, I know the end-point - when setting up remote offices, I know both ends, when doing Business to Business - we know both ends and have contracts with big legal words and serious penalties if trust is broken...
I realize that many folks want VPN, not for those use-cases, but basically to break geo-locking of content over the internet - just be advised - setting up and using a VPN cuts both ways - it's a trust relationship, and by using a VPN on the router, one is bypassing all the firewall protections it offers, and establishing a trusted end-point inside your network...with full access to all nodes within..
That commercial VPN provider might be a front-end shell corporation for a 3/4 letter government agency, or worse yet, a commercial entity that is data mining your info - so make sure you trust them.
sfx