You know that this team just play with curiosity ? it's some SHA1 String, so what is the big deal about releasing this false clue ? just to keep patient the people and play with them
I can release myself a SHA1 string from the Wii U execution, so what ? this team never really release open source code, it was just some tools and exploit that was already existed before.
They probably try to snif every packet that the Wii U send and make a dump fly, so exploiting the connection between the Gamepad Wii U and try to understand how it's works (well easy to know) actually the Wii U Gamepad use a silent app that is executed during the boot process of the Wii U based on the Vivu technology (Wifi Display by ATI/AMD) even it's secure you can still take some packet away (nothing it's secure on fly) to read the info.
Payload + remote exploit
Anyway not sure that they are going to release something after what happen on the PS3 Scene that bring some kid and lam mentality, hope that the Wii U Community stay more mature.
Also it's too early to release a Wii U Exploit (or if you want to kill the Wii U future, do it) you can also find a partial open source code of the Wii U that Nintendo release recently (no sure it's help but it can be a way)
Now it would be nice to just exploit the Wii Mode and why not the Gamepad Wii U but don't do anything that will make problem for the future of the Wii U... (like the 3DS, it's better to keep the platform really alive to bring better games)
For sure you will be able to connect your Gamepad Wii U on a computer
By the way if you really want to check what the SHA is about, just use Ighashgpu (for ATI/AMD/NVIDIA GPU) is a strong program that can crack really fast with the help of your GPU