Do you want both sides to be able to start a connection to port 8080 on the opposite side, or do you just want certain host on 0.0 to be allowed to reach a certain host in 1.0 on port 8080?
Usually, you should have a rule very early in the forward chain, that says to accept traffic with a connection state of established, and another one to accept related connections. These rules will allow the “reply” traffic from anything you’ve allowed outbound. If your rules say “allow out to tcp 25” then these established/related rules save you from also having to “allow in from tcp 25”
OK - so far, we’ve said “allow replies from any connection we’ve allowed to establish”
Now you just make a rule to allow the new connection:
/ip firewall filter add action=accept chain=forward protocol=tcp dst-port=8080 dst-address=192.168.1.4
You can stop there if you like - this would mean that anyone anywhere trying to reach .1.4:8080 will be allowed to do so.
If you want to limit this to a specific source network, add this matcher to the rule above: in-interface=LAN1
Remember that the replies from 1.4:8080 will be accepted by the state=established rule.
If you only want one specific host to be allowed to make this connection, then add this matcher to the rule above: src-address=192.168.0.4 and remove the in-interface=LAN1 condition. (it’s an unnecessary extra thing to check)
If you also want to allow 192.168.1.4 to reach 192.168.0.4:8080 then that requires a second rule. It’s the same as the first rule but with the src and dst addresses switched:
/ip firewall filter add action=accept chain=forward protocol=tcp dst-port=8080 dst-address=192.168.0.4 src-address=192.168.1.4
Finally, you want to block any communications between these two LANs that you haven’t already permitted explicitly.
/ip firewall filter
add chain=forward in-interface=LAN1 out-interface=LAN2 action=drop
add chain=forward in-interface=LAN2 out-interface=LAN1 action=drop
Make sure these are the last two rules that have anything to do with LAN1<>LAN2 communication.
Whenever you want a new type of connection between the LANs to be permitted, add the rule and make sure that it comes before these last two drop rules, but after the established/related rules.