I haven't notice anything similar happening on 6.43.8 or any other version. What was your previous version? I think it is very unlikely that your particular device will make those requests without proper reason (i.e. some (mis)configuration)
Personally, I would firstly recommend to make sure that those DHCP requests are originating from your device (i.e. not leaking from your lan somehow)
1) make sure that you are sniffing ONLY your router (i.e. you literary connect your sniffer/TAP device to WAN port of your router and there is no way for any other device to be connected to the same port of your TAP, where you are sniffing)
2) check the MAC of sniffed packets - does it corespond with your router?
3) check the content - there will be likely hostname - does it point to your router as well?
4) disconnect your router for few seconds - do the DHCP packets stop during that time? and start again once you connect your device back?
In any case, I guess you will need to share your config
. (feel free to replace any personal info like public IP etc..)
I believe it might be also beneficial to share few of your captured packets. (RouterOS can do capture to file. Screenshot does not really tell much)