but I couldn't find any weak entry point for an attack
Because if there is any weakness, it is not there. You could start with x=1 as well, and get as strong elliptic curve, as it currently is. The only difference would be in signatures, where you could get some advantage in case of bugs like SIGHASH_SINGLE. But nothing beyond that. If one point is weak, then all of them are, that's why picking a different generator doesn't change that much.
And using 2 as private key will result in our original secp256k1 G, using 3 as private key will result in n/2+1, so am I doing it wrong?
You are doing it right. If you use "1/2" as your base point, then you can just halve all of your private keys, and you will reach exactly the same points. So, it doesn't really matter if you have "3" as your private key on your curve, or if you have "3/2" on the original curve. It leads you to exactly the same public key, and all ECDSA operations are exactly as strong, as they were before.
Isn't this exploitable if we could find a point easily solvable by finding it's discrete log?
No, because the base point is "easily solvable". And guess what: knowing that the private key for "G" is equal to "one" gives you nothing. Knowing one weak point does not make the whole curve weak. You would need a way to take two public keys as your input, and produce a distance between them as an output. So far, nobody can do that by using "addition-only", or by using "multiplication-only". More than that: we cannot do that even by using "addition-and-multiplication", because this thing is what we can call "a signature", and you cannot produce that kind of connection for two public keys, without knowing private key for any of them.
I really don't understand why selecting the right G is important, can someone explain please?
Because if you would have some curve with a point, where x=0 is valid, then you could mess up with signatures. Similarly, for x=1, and for such small numbers, you could have some safe curve, that has vulnerable signatures. In general, if your z-value is not protected enough, and for example you directly sign data, without any hashing, then using unsafe generator could lead to some problems. Another thing is that if your generator is small, then you cannot do some things, for example you cannot create a puzzle, based on mining public keys. For that reason, if we would have some puzzle, where there would be a reward for getting leading zeroes in x-value of a public key, then we would be forced to redesign it, to find different solutions, like a binary digits of a "pi" constant, or something like that, because our "1/2" would allow getting all smaller rewards, without checking 2^90 public keys.