The tweet does not provide specific information about the WAF bypass techniques used. It is important to have more details about the vulnerability type, payload, and WAF vendor to analyze the bypass techniques effectively.
For more details, check out the original tweet here: https://twitter.com/eagle_0408/status/1859987198323642737