Password complexity is not just for brute-force attempts on the account login, which 2FA would help mitigate. But password complexity also protects against the situation when the password hash database leaks.
2FA only helps if 2FA is turned on and enforced. If you have the option to "authorise" a device, then all the user has for protection is the shorter password.
Conceptually
But what about bruteforce detection measures? And what about resetting passwords when a breach occurs? And what about all the other layers of protection? Can't we reduce each layer if we use many layers of protection?
Technically, yes, but then you put all the effort into maintaining each layer of protection because now the failure of any one layer becomes more likely, which puts more importance on the other layers. In practice, reducing the strength of one layer artificially because you rely on other layers creates a "technical debt" that you have to address from then on.
Password length, specifically
But I have worked with accessibility experts who loved 2FA because it meant that people could have much simpler passwords. And that's not a factor to dismiss. With a password that was simple to type and a phone with a push authentication app (not SMS), people with challenges remembering or entering passwords could enjoy much greater security of their accounts and independence of maintaining their privacy (often, helpers need to log in for people).
So, as with all things about security, there is a trade-off of risks and costs. I would be happy to endorse a reduction in password complexity if it meant that users could better independently maintain their own accounts and there were mitigations in place.