If someone is injecting MySQL statements to my PHP-based app. I use MySQLi real escape strings, however the attacker simply injects SQL statement. Let's assume:
The attack simply injects a statement: http://example.com/?id=1 LIMIT 10
And, even after escaping the strings, the code is executed as follows.
SELECT * FROM ex WHERE id = 1 LIMIT 10