BTW the link to the NIST document recommending 8 character passwords, that recommendation is from 2017. I find it hard to belief that anybody would consider that secure today. And if you're very confident on the security of a 8 character password, please share your 8-character secured bitcoin wallet with me

(no harm intended)
Yep, but we don't have a limit at 9 characters, we have it at 19, i.e. NIST says no less than 8, SWOS says no more than 18 (and the document has been revised in 2020 without editing that part).
And it is not something you can - I believe - bruteforce offline.
If you have set some sensible rules to prevent access to the login page of the router from outside LAN and - possibly - even from any IP address on the LAN but a single one, it would be difficult to even attempt accessing the login page.
But, when you have access, there is also an implied rate-limiting, when brute-forcing (say) a .rar archive password specialized hardware (GPU's) is often used to increment the possible attempts from thousands passwords per second to tens or maybe hundreds thousand password per second.
I wonder how many password per second you can "feed" the login page of a Mikrotik before it errors out, possibly a few tens?
Now, if tangent is right and the password is stored in plain text (which I doubt), still you have to either use the login page with its limits or dump the device memory, this latter implies both physical access and taking the device out of the network.
A clever attacker could replace the Mikrotik device with an identical one with an identical (or similar enough) configuration in a few seconds/minutes, of course, the short downtime would probably be attributed to a glitch of the matrix.
The "fake" machine should however behave exactly like the old one did.
To do this this hypothetical hacker would need to observe your network behaviour and rebuild a "good enough" configuration from the way the device behaves, but as soon as something won't work on the "fake" machine the network admin will attempt to access the device and find out that the "old" password doesn't work anymore and suspect something or however fix the configuration and make a new password.