Well, if the SDK is for a game dev purpose, there would be nothing related to the native OS...
You wand to run games, you're only in an applicative matters... Basis of IOS won't be delivered there...
If you hacked it you will be stuck in the OS...
The Wii was created on the barre metal, the Wii U as some OS to catch errors...
But maybe if you are able to create you own OS to flush the Wii U one and manage the disable bit and go through all securities... Well may append in the future...
I think you will need some rop to get it work... Remember the 3ds ...
The Wii U actually runs two operating systems: it still runs IOS on the ARM CPU like it did on the Wii, but now there's also an OS running on the PowerPC called Cafe OS. The SDK is an interface that lets game developers access resources, like graphics, sound, controller input, and filesystems. Cafe OS sits between the games and the hardware, giving the games access to these resources. It may delegate some of that work to IOS as well.
What this means is that there are 3 levels to exploit on the Wii U: userspace, Cafe OS kernel, and IOS. Userspace exploits are the very first step, and can likely only be done through the browser. A browser exploit would require ROP, like on the 3DS, since Cafe OS enforces non-executable memory. Once you have code running in userspace, you get access to the Cafe OS SDK. This is pretty much all you need for homebrew. However, in userspace, you're just another consumer of Cafe OS, like all other Wii U applications. With a Cafe OS exploit, you could get direct access to most of the system. As you mentioned, you could also replace Cafe OS with something else (like Linux, which was fail0verflow's plan). But even with control over Cafe OS, some hardware is still managed by IOS, so to completely own the system, IOS needs to be exploited as well.
Technically, there are actually 4 levels, since IOS is a microkernel and runs most drivers in userspace on the ARM. Meaning that even if you exploited a specific device driver in IOS, you'd only get the privileges of the driver and would still need to exploit the IOS kernel.