So I have already reported this directly to Mikrotik and they say it is normal and nothing to worry about. I disagree and would like to know what other people here think.
This "bug / hack" allows you to add device(s) to the neighbour list of any Mikrotik device anywhere in the world without knowing it's password as long as you know it's IP address. The prerequisites are that the target has neighbour discovery enabled on the interface the packet arrives on and no firewall blocking UDP port 5678 - which is the default state.
All you need to do is change the destination IP of an MNDP packet from 255.255.255.255 to the IP address of the target. It is also notable that this packet will add the same neighbour device to ALL Mikrotiks it passes through on it's way to the target.
While this is perhaps harmless fun - it could be the doorway to any kind of buffer overflow type attack as you can set the name of the neighbour to be any string you like. In my opinion only broadcast MNDP packets should be accepted.
Anyone have any thoughts on this?