Thanks for the screenshots!
Configuration and routes look good, actually.
You have two default routes (0.0.0.0/0), one with metric 1 and one with metric 0.
The default route with the lowest metric 0 will be chosen. Any traffic going to fx. a public IP will use that. The metric 0 route points into the NordVPN interface.
(The metric 0 route was likely created automatically by some Wireguard-related software, see above post.)
My best guess is: if you connect to your MobileDevices VPN from the outside (a public IP), your MobileDevice wireguard actually accepts the connection handshake. Then it sends a handshake reply.
-if- the NordVPN tunnel is active, that metric 0 route into the NordVPN tunnel exists. And that means the MobileVPN handshake reply gets caught up in there, instead of going back out the WAN interface to your phone or whatever.
So...
What you want is probably to route reply traffic back the same way that the initiation for that traffic came from. Pretty much what everybody wants in 99.9% of all cases, of course 
(Notable exceptions that come to mind are ISPs and TV broadcasters, but whatever.)
Happens to be a normal feature in lots of high-end equipment... I recently looked at the network equipment for a very large media company, and those were configured to their default setting - which is to remember where connections come from, and send the reply back the same way.
Unfortunately for you, that is NOT how Linux works...
Linux insists that it is an Internet Router, and what it does is consult the whole IPv4 routing table for every darn packet.
Then when it finds the longest prefix that matches, that's where the packet goes.
It won't remember where a connection came from, and you have to figure out a way of manually forcing the MobileDevice handshake reply out the correct interface.
It's super stupid, and it causes lots of people endless problems, but that's just the way it's done, historically and now. (unless you pay for very expensive equipment of course.)
Hmm, now I'm wondering how the traffic from your NordVPN wireguard daemon gets out your WAN interface and over to the Nord VPN gateway without getting caught up in the metric 0 route.
Probably there is a special IPv4 "rule" to select -either- an alternative, non-default routing table, -or- select the metric 1 route.
Could you post this too:
# ip -4 rule
So we can check that out?
Perhaps we can piggy-back on how that works.
For example we can create a Traffic Rule to apply a "firewall mark" for all outgoing MobileVPN gateway traffic:
Aaand then an IPv4 rule to match the mark and select an alternate route table which always points to WAN:
Hmm.
Alternatively, you could drop the "automagic" creation of default routes by the wireguard software into the NordVPN tunnel in the nordvpn peer settings.
And then you would need to create your own default route into the NordVPN tunnel, but -only- apply it for traffic coming from your LAN zone.
This is maybe the easiest solution; fx. just drop a fwmark on anything from "lan" (traffic rule), add an ipv4 rule to select routing table "nordvpn" for anything matching the fwmark, and in the "nordvpn" routing table just have one entry, 0.0.0.0/0 -> wg_NordVPN. (default into the vpn interface.)
Yep this is probably by far the easiest way.
EDIT: Let me know if you want a couple UCI commands that will do what you want. I don't think we even need to use a traffic rule and fwmark, we can just make an ipv4 rule for a specific Incoming Interface.