I understand the argument about home users. You could just as easily say, though, that UPnP is especially dangerous in the hands of an average home user who doesn't understand the potential risks or how to defend against them.
Here's a list of known MiniUPnPd vulnerabilities from January of this year:
http://www.cvedetails.com/vulnerabi...duct_id-24263/Miniupnp-Project-Miniupnpd.html
Here's a press release from UPnP Forum from February of this year:
http://www.marketwire.com/press-rel...ed-libupnp-miniupnp-security-flaw-1754771.htm
It contains this interesting snippet:
"Please note that other issues have been identified in the latest version of MiniUPnP, 1.4, but they won't be publicly disclosed until the library's developer releases a patch to address them, so we advise caution on any further usage of this stack until such time."
There's an interesting (and old) discussion about MiniUPnPd vulnerabilities here:
http://miniupnp.tuxfamily.org/forum/viewtopic.php?t=435
It discusses in part a particularly devious proof-of-concept attack using Flash. Basically: a user visits a web site, the web site contains a bit of Flash code, the Flash code runs inside the user's browser--and therefore inside the user's network. Because it's inside the user's network the code can configure the user's router via UPnP. I don't know if that particular hole is still open, but it gives you a sense of the potential risk. The key problem is the one my original links pointed out: UPnP has no authentication, so anyone with physical access can do anything they want. Well: anything UPnP allows.
Again, this is/was just a suggestion. I understand the conundrum. I'm just supplying a bit more background material.