1) It is possible to have multiple subnets "behind" one router; the Internet would be a very broken place with millions more routers needed if it were not.
However, your example of using a /16 subnet mask on the LAN interface, with many /24's connecting to it, is not exactly how it would actually function. (More on that in a moment.)
2) There are many use cases. This aggregation and routing of traffic for many networks/ subnets is the purpose of a router.
Take for a simple example, a branch office location with VoIP telephones. At this site, there is a router connected via Dot1q trunking to a layer 2 access switch.
There is, of course, a need for separation of the Voice and Data traffic, which can be achieved by using separate VLANS on the access switches. Each VLAN will have a separate subnet back on our router. Each subnet would terminate on its own "sub interface", a logical partitioning of the physical connection to the access switches.
In this example, there are two subnets (one for data, and one for voice) living "behind" the router.
3) The performance benefit is that you don't need a different physical device to handle the routing for every single subnet in your network. You talk about the traffic ending up on the same router, and it does, but the traffic is still separated unless you specifically allow it to move between the subnets.
Best Answer
Usually firewall is a router, so normal configuration for router is have different subnets on different interfaces.
In Your diagram, as I guess, implied that LAN is private and WAN is public IP space, so "firewall" really do not only Firewall work (filtering) but also NAT-router work (routing and address translation).
But in some cases is useful to configure firewall as transparent bridge (switch) without making influence on subnets architecture.