Current default config is fine, it blocks anything coming from WAN (I have no idea since which RouterOS version). This one is from SXT, where wireless interface is supposed to be WAN by default:
/ip firewall {
filter add chain=input action=accept protocol=icmp comment="default configuration"
filter add chain=input action=accept connection-state=established,related comment="default configuration"
filter add chain=input action=drop in-interface=wlan1-gateway comment="default configuration"
...
}
As you can see, incoming packets to port 53 have no chance. And if you do complete reset to no settings, remote DNS requests are disabled completely by default, so that's fine too.
The problem is when users start messing with the config (generally speaking, nothing against you

). And they do, because e.g. forwarding a port is a common thing. Look at the forum how it goes, how many threads about port forwarding troubles exist. Be sure that for every such thread here, there are thousands of users all over the world doing the same and completely messing up their firewall in the process. If they accidentally disable the blocking rule, they won't ever notice, because it won't break anything from their perspective.
So no matter how much secure is default config, it does not mean much. People will break it and MikroTik can't do much about it. Except maybe this older idea could help a little:
Feature request: DNS setup for local networks Unfortunately, it did not get any feedback from MikroTik. But if the proposed allow-remote-requests=localnets was used in default config, it would not be so easy to get DNS resolver open to whole world. It would not stop those wanting to do it. But it could not happen by accident if someone was just playing with firewall rules.