I think there's some confusion about your question. The way stream ciphers work is by generating a keystream that gets (usually) exclusive-or'ed with the message. You are correct that if you use the same key and IV, and thus the same keystream, that this leaks information about the messages.
Here, K is the key stream generated by RC4:
C1 = K ^ M1
C2 = K ^ M2
And by rearranging:
C1 ^ C2 = (K ^ M1) ^ (K ^ M2)
the keystream cancels out here, and you're left with
C1 ^ C2 = M1 ^ M2
Since the attacker knows the two ciphertext values, he can compute the difference of the two messages. If the attacker knows one of the inputs (perhaps a fixed header), he can compute the second message.
M2 = (C1 ^ C2) ^ M1
There's also some statistical tests using cribs, if the messages are natural language.
To answer your question, RC4 should generate an entirely different keystream under related keys, so this attack won't work. There are other attacks against the key scheduling algorithm though, and plenty of reasons to prefer an alternative to RC4.
If you're asking about recovering the initial key from the keystream, there are a few