How can the CVE-2024-43479 Power Automate Desktop Remote Code Execution vulnerability be exploited, and what should administrators do to safeguard their systems?