One has nothing to do with the other. HDMI is many years old and you can still buy two devices and have them not work. The problem is lack of proper testing, and mandatory certification. Each random guy can wake up tomorrow and build streamer based on licensed or open-source software, having no idea what bugs there are.
And it is not just reliability but security vulnerability. UpnP was responsible for one of the largest breaches of Windows years back. Even today, it remains very vulnerable and given the above situation with a bunch of random little companies implementing, the problem is not likely to go away anytime soon:
https://www.akamai.com/us/en/about/...arns-of-upnp-devices-used-in-ddos-attacks.jsp
"Akamai Warns Of UPnP Devices Used In DDoS Attacks
Cambridge, MA | October 15, 2014
Four million Universal Plug and Play devices may be vulnerable to use by attackers
Fake requests to UPnP devices can elicit DDoS traffic to a target
Advisory explains need for vendor and community action
Akamai Technologies, Inc. (NASDAQ: AKAM), the leading provider of cloud services for delivering, optimizing and securing online content and business applications, today released, through the company's Prolexic Security Engineering & Response Team (PLXsert), a new cybersecurity threat advisory. The advisory alerts the security community, device vendors, Internet service providers and enterprises to the risk of massive distributed denial of service (DDoS) attacks involving Universal Plug and Play (UPnP) devices. The advisory is available for download from Prolexic (now part of Akamai) at
www.prolexic.com/ssdp.
PLXsert has observed the use of a new reflection and amplification DDoS attack that deliberately misuses communications protocols that come enabled on millions of home and office devices, including routers, media servers, web cams, smart TVs and printers. The protocols allow devices to discover each other on a network, establish communication and coordinate activities. DDoS attackers have been abusing these protocols on Internet-exposed devices to launch attacks that generate floods of traffic and cause website and network outages at enterprise targets."
This was posted a month ago:
https://threatpost.com/upnp-trouble-puts-devices-behind-firewall-at-risk/114493/
"UPnP Trouble Puts Devices Behind Firewall at Risk
Security vulnerabilities in UPnP continue to crop up and continue to put millions of home networking devices at risk for compromise.
The latest was revealed in early August, but prompted an advisory yesterday from the DHS-sponsored CERT at the Software Engineering Institute at Carnegie Mellon University. It’s called Filet-o-Firewall and it combines a number vulnerabilities and weaknesses in routing protocols and browsers, conspiring to expose networked devices behind a firewall to the open Internet.
The primary target is the UPnP service running on commodity home routers, and according to the advisory and research disclosed by researcher Grant Harrelson, attacks can happen in fewer than 20 seconds and any router running UPnP is at risk."
http://routersecurity.org/bugs.php
"Attackers are using insecure routers and other home devices for DDoS attacks
by Lucian Constantin of IDG News Service August 18, 2015
"Attackers are taking advantage of home routers and other devices that respond to UPnP (Universal Plug and Play) requests over the Internet in order to amplify distributed denial-of-service attacks. A report released Tuesday by cloud services provider Akamai Technologies shows that the number of DDoS attacks is on the rise." Akamai points out that very few organizations have the infrastructure necessary to deal with DDoS attacks, and, of course, they sell the cure. SYN floods and Simple Service Discovery Protocol (SSDP) reflection were the most popular DDoS vectors. The use of SSDP for DDoS started in the last quarter of 2014. SSDP is part of UPnP which was intended to be used on Local Area Networks only. Despite this, many routers and other devices respond to SSDP queries over the Internet. How many? According to the Shadowserver Foundation, there are roughly 12 million IP addresses on the Internet that have an open SSDP service. You can't make this stuff up. You can test your router, from the inside, by visiting upnp-check.rapid7.com. A good result looks like this.
Q2 2015 State of the Internet - Security Report by Akamai August 18, 2015"
I can go but I hope you get the message. This is messy software. I highly recommend that you disable UpnP in your routers if you don't need it and don't deploy it in other devices unless you are dead set on using it.