This tweet describes a manual bypass for a SQL Injection vulnerability affecting a WAF. The payload used is 'AND+0+/*!50000UNION*/+/*!50000SELECT*/+1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21–+-'. The vendor specified is 'Manual'. A blogpost should be created with details on the product, vendor, type of bypass, and technical details.
For more details, check out the original tweet here: https://twitter.com/Esparta6108713/status/1789573061903081672