Why not IPsec with a certificate? Nobody’s gonna bother brute-forcing that, so you will be able to drop the token 2FA.
Alternatively IPsec with PSK + specific peer-id is arguably pretty much “username + password”. (assuming you’re looking to avoid XAUTH/EAP, which can deal with true usernames and passwords)
I use the free FortiClient VPN to access my 61E using IPSec. It’s pretty easy to set up. I switched from SSL after all the vulnerabilities. If you have access to the Cookbook for your version of FortiOS it’s a great resource. I also use site to site IPSec tunnels to two other 61E’s that I manage.
Honestly I think for the OP’s use case (home user with one person) from a security / cryptographic standpoint, IPSec with a PSK + peer ID is fine. I doubt that’s going to get brute forced – none of the strange IPSec traffic I’ve caught on my firewall looks like an attempt to brute force the PSK.
It’s a lot more dangerous in an corporate / multi-user setting for on-client stealer malware to extract those credentials. And for the OP’s fear, who knows, maybe one day we’ll see an IPSec VPN zero day even though it has fewer userspace components involved but more kernel and ASIC attack surface.