That's because it never happened...
I've worked and I'm still working on exploiting both the Vita and the Wii U, so I know pretty accurately how the exploits were developed.
The PlayStation Vita's exploit is a heap buffer overflow known as CVE-2012-3648 (a Proof of Concept for this exploit was released under the tag PSA-2013-0903-1). It was being used for a long time by Vita developers before it went public and, it terms of security, it's a considerably powerful exploit.
The Wii U's exploit is a use-after-free bug that was published here:
https://code.google.com/p/chromium/issues/detail?id=226696
It's not as powerful and it's definitely not the bug used in the Vita.
The exploit found for the Vita works on the PS4 as well, so it makes sense it was simply ported over.
This exploit drew more attention because people thought those systems were quite secure and nothing had been done with them yet. On the other hand, Fail0verflow had already cracked the Wii U wide open and even gave a detailed on presentation on how to do it.
Obviously, finding a WebKit and exploiting it wouldn't get as much attention since it was already expected to happen.
What you could have mentioned is that Gateway is using the exact same bug to exploit the 3DS, as Yifan Lu posted here:
http://yifan.lu/2015/01/10/reversing-gateway-ultra-first-stage-part-1/